Illustration by Ilamparithi Raju

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we ...
UEM:  Es tiempo de asegurar los navegadores de su empresa.

UEM: Es tiempo de asegurar los navegadores de su empresa.

Al hablar de gestión unificada de endpoints (UEM – Unfied Endpoint Management), es usual que los administradores de TI piensen en computadoras, switches e incluso dispositivos móviles. Pero, ¿qué pasa con los ...

UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust ...
Security Boulevard
threat intelligence

Software Asset Management as a Security Practice

Software asset management (SAM) and documenting software license compliance has often been viewed as a necessary but tedious bookkeeping function that takes time from higher-priority security and operational IT tasks. But a ...
Security Boulevard