A hacking campaign that exploited Ivanti mobile device manager to target the Norwegian government began in April or possibly earlier, say cybersecurity agencies from the U.S. and Norway. Mobile device management systems are "attractive targets for threat actors," the alert warns.
For the first time in 17 years, day-to-day control at converged endpoint management provider Tanium rests outside the Hindawi family. The Seattle-area firm named former Tibco, BMC Software and Salesforce executive Dan Streetman as CEO to evolve Tanium's client-facing operations and partner strategy.
Cybereason has gone all-in on helping customers mitigate threats beyond the endpoint to minimize the impact of ongoing SOC staffing challenges, CEO Lior Div says. The company's focus on tracking and following malicious operations sets Cybereason's approach to XDR apart from rivals.
Remote access VPN has been an enterprise network staple for years. However, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. Network and security teams are asking about how to secure access to all applications—not just those in the data center.
Learn how to ensure zero trust access to private applications in datacenters, Azure and multi-cloud environments. Leverage your Azure AD user store for Single Sign On (SSO) into any private resource, beyond just SAML-based web SSO.
When it comes to keeping your private apps private, on-prem VPNs lack the agility...
Lack of visibility is the single biggest challenge facing security teams today, and this latest report from Sevco identified a significant gap in the IT assets missing basic security tool protections.
It also uncovers the more insidious threat of “stale” IT assets that act as ticking timebombs for...
The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.
This year's winner of RSA Conference's prestigious Innovation Sandbox Contest has completed its first major funding round, earning backing from CrowdStrike CEO George Kurtz. Talon has received $100 million to support more operating systems, add more capabilities and boost existing integrations.
The cloud. SaaS. Mobile workforces. An unstoppable wave of BYOD. Today, users and the applications they depend on are more widely distributed than ever. Networks are exposed and threats continue to evolve. But “lock it down” no longer works. IT Security teams need to achieve the same visibility and control they...
Many enterprise security practices were incorporated into the 5G standard, however the deployment rollout and status of 5G is continually evolving. Additionally, network slicing, a 5G service offering, has the potential to become a security tool for enterprises to leverage in addition to its role of delivering...
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Mosyle closed a $196 million funding round to expand beyond mobile device management and provide a holistic security platform for Apple devices. The company wants to boost adoption of Mosyle Fuse, which combines MDM, endpoint security, encrypted DNS, identity management and app management.
This document is a security guideline for enterprise deployments of Red Hat® Ansible® Automation Platform. It contains security configuration and policy recommendations for Ansible Tower using the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and supporting security controls...
Security is one of the most important considerations in development today, impacting all aspects of
the application life cycle. In fact, security has risen to a business-level imperative, a top-of-mind priority for C-level executives because one security breach can destroy a brand’s reputation.
They are high-profile, they have access to your
company’s most vital information, they rely on
unsecured personal devices – and your cyber
adversaries are targeting them. They are your
board members, and Chris Pierson of BlackCloak
has ideas on where and how you can better secure