BYOD Security
South Korean iPhone Ban: MDM DMZ PDQ
Richi Jennings | | android, Apple, Apple iOS, Apple iPhone, bring your own device, byod, byod challenges, BYOD policy, BYOD Security, clandestine iPhone tracking, iPhone, iPhone and iPad, iphone security, Korea, Korean military, MDM, military, military grade security, Military Security, Mobile Device Management (MDM), North Korea, northkorea, Noth Korea, Operational military strategy, opsec, Samsung, Samsung Galaxy, SB Blogwatch, South Korea, southkorea
MDM Hindered: Android phones are still OK; this is Samsung’s home, after all ...
Security Boulevard
Now is the Time To Rethink Your BYOD Security Strategy: Q&A with Cybersecurity Insiders Founder, Holger Schulze
Woodrow Mosqueda | | advanced threat protection, ATP, BitDefender, bitglass, byod, BYOD Security, Cloud Apps and BYOD, Cloud Security, CrowdStrike, Cylance, digital footprint, Digital Transformation, Malware, Ransomware, SaaS, secure access service edge
As more companies embrace the Bring Your Own Device (BYOD) movement to accommodate a rapidly evolving workforce, one question comes to mind: How are IT and security leaders handling this sudden wave ...
The Future of Work is Hybrid – Is Your Security Ready?
Jonathan Andresen | | bitglass, byod, BYOD Security, CASB, Cloud Apps and BYOD, Cloud Security, Digital Transformation, SaaS, secure access service edge, VPN replacement, working remotely, Zero Trust Network Acess, ZTNA
It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a ...
The Role of 5G in Defining Cybersecurity Strategies
Increased availability and adoption of 5G technology means a more connected world, which in turn means more users with a greater variety of devices. While this means that IT security teams will ...
Security Boulevard
Ignorance is Bliss… for Hackers
Woodrow Mosqueda | | advanced threat protection, ATP, BitDefender, bitglass, byod, BYOD Security, Cloud Apps and BYOD, Cloud Security, CrowdStrike, Cylance, digital footprint, Digital Transformation, Malware, Ransomware, SaaS, secure access service edge
Imagine standing in front of the CEO and company board of directors, asking them for a check for an obscene amount of money to pay off hackers that are holding critical data ...
Will New Executive Order on Cybersecurity Fast Track Zero Trust?
Jonathan Andresen | | advanced threat protection, ATP, BitDefender, bitglass, byod, BYOD Security, Cloud Apps and BYOD, Cloud Security, CrowdStrike, Cylance, digital footprint, Digital Transformation, Malware, Ransomware, SaaS, secure access service edge
On May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the ...
Malware in the Cloud: Odds Are You’re Infected
Nate Springer | | advanced threat protection, ATP, BitDefender, bitglass, byod, BYOD Security, Cloud Apps and BYOD, Cloud Security, CrowdStrike, Cylance, digital footprint, Digital Transformation, Malware, Ransomware, SaaS, secure access service edge
Malware attacks increased by 358% in 2020, while ransomware attacks, in particular, increased by 435%. Additionally, malware is targeting cloud apps more than ever before, and, at any given moment, 44% of ...
The Healthcare Breach Report: Hacking and IT Incidents on the Rise
Will Houcheime | | breaches, BYOD Security, CASB, Cloud Adoption, Cloud Apps and BYOD, Cloud Data Protection, Cloud Security, healthcare
The vast majority of healthcare organizations utilize and store highly sensitive data, such as protected health information (PHI) and personal data such Social Security numbers, personal financial data, and more. For our ...
Thwarting Malware Attacks with Bitglass
Will Houcheime | | Access control, bitglass, byod, BYOD Security, CASB, Cloud Adoption, Cloud Apps and BYOD, Cloud Data Protection, Cloud Security, cost effective, SASE, working remotely, ZTNA
As more and more data is stored in the cloud and companies enable BYOD and remote work, comprehensive threat protection against known and zero-day malware becomes a critical need. Unfortunately, even some ...
The Bitglass SASE Triangle: ZTNA for Internal Applications
Will Houcheime | | Access control, bitglass, byod, BYOD Security, CASB, Cloud Adoption, Cloud Apps and BYOD, Cloud Data Protection, Cloud Security, cost effective, SASE, working remotely, ZTNA
Remote work, the remote workforce, working from home--all common phrases due to the series of unprecedented changes that have occured over the last several months. Organizations have had to adjust in order ...