Posts tagged with "Mobile Threat Defense"



23. October 2020
2020 Threat Hunting Report
Falcon OverWatch (TM) is the CrowdStrike® managed threat hunting service built on the CrowdStrike Falcon® platform. OverWatch provides deep and continuous human analysis on a 24/7 basis to relentlessly hunt for anomalous or novel attacker tradecraft designed to evade other detection techniques.
06. October 2020
Accountability in your digital workspace
As we wrap up our blog series on 7 things you can do to improve your mobility ecosystem, we would like to leave you with this final thought: the success of your digital workspace is predicated on the effort from across your entire team – from the front-line resources in their daily leveraging of the mobility solution, to your back office team consuming the data generated throughout the business and contributing to its agility. At the end of the day, the singular goal for the organization is...
29. September 2020
ISEC7 SPHERE
As we saw in our previous article about Multi-Factor Authentication (MFA), one of the key parts of security is ensuring the identity of the users accessing your corporate resources. This can be combined with other well-known technologies like Single Sign-On (SSO) to make that process not only as secured as possible but also as simple and transparent for the end-users, so they are not tempted to use easy and weak credentials.  But identity is just one piece, considering that once identified,...
25. August 2020
ISEC7 SPHERE
What is Multi-Factor Authentication?  Multi-Factor Authentication (MFA) is an authentication method in which a user is required to present two or more pieces of evidence (also known as factors) to authenticate. Factors include:  Knowledge: Something the user and only the user knows (ex: credentials like password and PIN)  Possession: Something the user and only the user has (ex: mobile device, token, credit card CVV)  Inherence: Something the user and only the user is (ex: fingerprint,...
14. August 2020
ISEC7 SPHERE
Every organization now has tablets and smartphones regularly connecting to their data. For many IT administrators, the default way to handle those devices is to deploy a Mobile Device Management (MDM) solution – which makes sense. After all, you should have an inventory of your devices and be able to manage them. But what about when one of your employees receives a malicious phishing link on their mobile device or they accidentally install a malicious app? To complete your mobile strategy and...
13. August 2020
ISEC7 SPHERE
Twitter recently experienced one of its most notable breaches. On July 15, an unauthorized party entered its backend infrastructure and gained access to 130 accounts belonging to high-profile individuals such as Barack Obama, Kanye West, Bill Gates and Elon Musk. The attackers stole more than $100,000 by tweeting out Bitcoin phishing scams and snatched data from some of the handles.
04. August 2020
ISEC7 SPHERE
What is MTD?  Yet another three-letter acronym in the increasingly complex mobility world?  Well, not exactly. MTD stands for Mobile Threat Defense and, to make a long story short, this is comparable to the typical antivirus software installed on your desktop computers but extended to a whole new level to tackle the challenges brought on by our ever-connected mobile devices.