Android Enterprise Adds Flexibility But Still Calls for UEM Solutions

Android Enterprise simplifies device management and concretizes work and personal usage, but does not bring security to the legacy framework. Implementing a strong UEM solution can fill in the gaps.

The post Android Enterprise Adds Flexibility But Still Calls for UEM Solutions appeared first on Security Intelligence.

Continue reading Android Enterprise Adds Flexibility But Still Calls for UEM Solutions

9 Best Practices from X-Force Red for Organizations and Employees

As employers rapidly respond to the need to protect their workforce from potential exposure and spread of the novel coronavirus and the disease known as COVID-19, many of your organizations are making the very difficult decision to pivot to a work-from-home model. That means employees will be connecting to the corporate network from whichever device […]

The post 9 Best Practices from X-Force Red for Organizations and Employees appeared first on Security Intelligence.

Continue reading 9 Best Practices from X-Force Red for Organizations and Employees

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench […]

The post How We Learned to Stop Worrying and Embrace Remote Work appeared first on Security Intelligence.

Continue reading How We Learned to Stop Worrying and Embrace Remote Work

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

Malware on official mobile app stores is a growing concern for all users. Increasingly, malware developers are getting around sophisticated app store controls by using mobile malware downloaders.

The post The Role of Evil Downloaders in the Android Mobile Malware Kill Chain appeared first on Security Intelligence.

Continue reading The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

Data Privacy in the Modern Workplace

News of privacy-related fines and investigations have led many businesses to scramble to achieve compliance and protect customer data. However, many fail to consider their employees’ data privacy.

The post Data Privacy in the Modern Workplace appeared first on Security Intelligence.

Continue reading Data Privacy in the Modern Workplace

How to Tell Safe Advertisements From Dangerous Malvertising

With malvertising on the rise, how can users and organizations tell the difference between safe advertisements and malicious ones that threaten personal or company data?

The post How to Tell Safe Advertisements From Dangerous Malvertising appeared first on Security Intelligence.

Continue reading How to Tell Safe Advertisements From Dangerous Malvertising

Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

How to Reduce the Risk Posed by Vulnerable Mobile Apps

With so many risky mobile apps out there, one way of reducing this risk is to start looking into your BYOD practices and determining if they make sense for your organization.

The post How to Reduce the Risk Posed by Vulnerable Mobile Apps appeared first on Security Intelligence.

Continue reading How to Reduce the Risk Posed by Vulnerable Mobile Apps

Enterprise Mobility Management Gets Personal

Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models.

The post Enterprise Mobility Management Gets Personal appeared first on Security Intelligence.

Continue reading Enterprise Mobility Management Gets Personal