Posts tagged with "digital workplace"



14. June 2022
Demystifying Cybersecurity: Cloud Infrastructure Entitlement Management (CIEM)
In the past, all corporate services used to be located on-premises, behind well-guarded walls. With the rise of mobile devices and the need to access all services, from anywhere, on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability.
01. June 2022
IoT - Internet of Things
Cybersecurity is here to stay, and chances are you already have some tools to protect your network, users, and devices. Most organizations are already using a multitude of tools and solutions to manage and secure their entire mobile fleet, endpoints, and network, but are they making the most out of them? Your Security Posture is not about deploying all security solutions and turning all the switches on, but identifying the risks, assessing them accordingly and applying the solution to address...
19. May 2022
Emergency Advisory: VMware Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive regarding vulnerabilities in VMware products. On Wednesday May 18th, VMware released an update for two identified vulnerabilities affecting the following products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.
17. May 2022
Public Service Announcement: Browser in the Browser (BITB) Attacks
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 
03. May 2022
Demystifying Security: Conditional Access
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...
21. April 2022
Data Loss Protection (DLP)
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.
05. April 2022
Demystifying Security: Threat Detection, Prevention, and Response (EPP, EDR, and MTD)
In a previous article, we covered Mobile Threat Defense (MTD) solutions, offering threat detection, prevention, and response on mobile devices. Today we will cover similar functions but in more traditional desktop devices like workstations, laptops, and servers. Although the goal is similar, due to its own idiosyncrasies, the response is delivered in a different manner, with two different solutions providing a combined response: Endpoint Protection Platform (EPP) and Endpoint detection and...
22. March 2022
X-ray of a Successful Global Enterprise Digital Workplace Strategy
Digital Workplace Strategy for International Enterprise Businesses  Continuing our blog series highlighting digital workplace strategies for small to medium-sized businesses and enterprise businesses, this week we will focus on digital workplace strategies for global enterprise businesses. We’ll look at how one global enterprise addresses their digital workplace needs and overall strategy, covering the multitude of offices with hundreds of employees at each location (United Kingdom,...
09. March 2022
State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...
01. March 2022
Cyber Security Solutions
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.

Show more