SEC SIM swap X account

Addressing the Mobile Malware Threat With Zero-Trust

AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Security Boulevard
Five Essential Tips for Successful Mobile Device Management

Five Essential Tips for Successful Mobile Device Management

With more employees performing daily tasks on smartphones and tablets, centralized mobile device management (MDM) is becoming more critical forRead More The post Five Essential Tips for Successful Mobile Device Management appeared ...
Five Essential Tips for Successful Mobile Device Management

Five Essential Tips for Successful Mobile Device Management

With more employees performing daily tasks on smartphones and tablets, centralized mobile device management (MDM) is becoming more critical forRead More The post Five Essential Tips for Successful Mobile Device Management appeared ...
Cloudflare ransomware FCC Google mobile Cybersecurity Issues in Mobile App Development

Security Vs. Convenience: Navigating the Mobile World

The emergence of COVID-19 vaccines has offered the UK light at the end of the pandemic tunnel. However, even with an increasingly vaccinated workforce, it remains unlikely that we will witness a ...
Security Boulevard
romance scams approval phishing pig butchering

Despite MDM, Financial Services Plagued by Phishing, Malware

Mobile device management (MDM) deployments haven’t exactly put the kibosh on threats to financial services. In fact, even while MDM adoption rose 50%, quarterly exposure to phishing between 2019 and 2020 jumped ...
Security Boulevard

Endpoint Device Controls for Secure Remote Working

By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud Endpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide shift to remote workforce ...
dial phone.jpg

MDM Brute Forced

via Sean Gallagher, writing at Ars Technica, comes this particularly unfortunate news for Apple Inc. (Nasdaq: AAPL) MDM (Mobile Device Management) bits - especially considering there will be a flood of new ...
Resetting Client Device Management

Resetting Client Device Management

Data is like water.  It ends up flowing freely through devices and cloud services like water down a river.  And users are bringing in an evolving group of devices and using more ...

Say YES! to BYOD

Most security professionals will be skeptical with people bringing their own computers and gadgets into the work place. Especially the risks involved including the lack of security patches, unlicensed software and malware, ...
BlackBerry Q10 review

BlackBerry Q10 review

It's been great working with the BlackBerry team. And one of the perks is getting our hands on new devices. I've been using the Z10 since November and have been really enjoying ...

Secure Guardrails