Posts tagged with "Goal Setting"



23. October 2020
2020 Threat Hunting Report
Falcon OverWatch (TM) is the CrowdStrike® managed threat hunting service built on the CrowdStrike Falcon® platform. OverWatch provides deep and continuous human analysis on a 24/7 basis to relentlessly hunt for anomalous or novel attacker tradecraft designed to evade other detection techniques.
21. October 2020
Virus Alert | MTD - Mobile Threat Defense
Enabling complete end-to-end mobile threat protection MobileIron and Zimperium have partnered to provide a complete enterprise mobile security solution that delivers sophisticated threat protection for mobile devices against phishing, as well as protect and remediate against attacks at the device-, network- and application-levels.
15. October 2020
ISEC7 SPHERE
In March 2020, over a third of the world’s population was put into lockdown as the COVID-19 crisis took hold. As a direct consequence of this, the pandemic accelerated an already growing shift towards remote work. Workforces around the world were told they could no longer return to the office and businesses were forced to quickly enable their employees to work remotely. In an instant, the traditional office environment transformed to an ‘Everywhere Enterprise,’ in which work takes place...
09. October 2020
Danger of QR Codes
QR codes are everywhere and, as it turns out, most of us are using them! According to a recent consumer sentiment study conducted by MobileIron, 40% of respondents have scanned a QR code in the past week, and 86% have scanned one in the past year. That’s a lot of people. But what are all those codes being used for, and could they potentially do something unexpected?
07. October 2020
MobileIron Delivers Day Zero compatibility for iOS14
Organizations want to secure corporate data without having to compromise user experience and the latest iOS and iPadOS releases have great device management capabilities that embed security and user privacy. I’m excited to share that MobileIron offers day zero compatibility and key feature support across its product portfolio for the following iOS 14 features:
17. September 2020
ISEC7 SPHERE
If you’re like many of our customers, your business fast-tracked some IT initiatives and investments earlier this year. What you achieved – employees working from home, customers supported, staying operational – is phenomenal. You also probably moved at tremendous speed and may not have had the time to consider all the implications of each decision in the way you normally would. Discussions with our customers worldwide have revealed that the impact of this may be an issue in the...
11. September 2020
ISEC7 SPHERE
In many states, the new school year has started. While schools in some states have resumed in-person instruction, most schools are offering online options or adopting a hybrid model of in-person and remote learning. This means that students are increasingly using their parents’ mobile devices to stay productive and get their homework done amid the COVID-19 pandemic, which can put company networks, infrastructure and information at risk.
04. September 2020
ISEC7 SPHERE
I’m Chris Sherman, a senior analyst serving Security & Risk (S&R) Professionals at Forrester Research, and today’s guest blogger for MobileIron. I recently sat down with the MobileIron team to discuss how I see the modern mobile security landscape evolving. The following video and Q&A help to illuminate some of the most pressing security threats faced by enterprises today — especially as they relate to mobile devices — and the tools used to address these threats. Watch the...
03. September 2020
ISEC7 SPHERE
The ability of an organization to sustain its resilience effort requires the organization to understand and develop essential crisis management frameworks and processes. Typically, frameworks will encompass the phases of preparedness, response and recovery. At the preparedness phase, the identification and prioritization of risks that threaten the existence and continuity of an organization’s delivery of critical business functions is essential for the follow up design of incident response...
02. September 2020
ISEC7 SPHERE
If the coronavirus pandemic was a lemon, then vishing is a cyberattacker’s latest approach to making lemonade. On August 20, the Federal Bureau of Investigation (FBI) issued a warning about the rise in vishing attacks. In a joint advisory with the Cybersecurity and Infrastructure Security Agency (CISA), the two agencies cautioned organizations of financially-motivated vishing attacks that operate with high efficiency and tight timelines.

Show more