UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust to working remotely. Naturally, the transition can be rocky for t… Continue reading UEM: Improving Device Security for Remote Workers

Forescout goes for $1.9 billion in private-equity acquisition

Private equity dollars continued to flow into the cybersecurity industry Thursday when Forescout Technologies announced it reached an agreement to be acquired by the investment firm Advent International. It’s an all-cash deal worth $1.9 billion, meaning Advent International will pay $33 per Forescout share, a rate that’s about 18% above Forescout’s closing price of $27.98 on Thursday. The company first went public in October 2017 at $22 a share. Forescout specializes in “device security,” a concept that allows companies to protect their share of any device connected to their networks. Its shares have fallen by some 12% over the past year, while the overall S&P 500 index has climbed by 22%, Silicon Valley Business Journal reported. The company’s fourth-quarter revenue grew 8% year-over-year to $91.3 million, propelled in part by a 14% jump in subscription revenue to $37.6 million. President and CEO Mike DeCesare will remain in charge, and Forescout’s headquarters […]

The post Forescout goes for $1.9 billion in private-equity acquisition appeared first on CyberScoop.

Continue reading Forescout goes for $1.9 billion in private-equity acquisition

Your WiFi signals are revealing your location

The home may be the hearth, but it’s not going to be a place of safety for too long.

With the abundance of connected devices making their ways into our homes, increasing levels of data may allow for more accurate methods for remote surveillance. By measuring the strength of ambient …read more

Continue reading Your WiFi signals are revealing your location

Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

Reading Time: 4 minutes Traditional end-of-life procedures for corporate mobile devices can’t scale to BYOD. Learn how to avoid the risks that can occur during personal device disposal.

The post Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk appeared first on Security Intelligence.

Continue reading Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology … Continue reading 5 Keys to Improve Your Cybersecurity

The Evolving Approach to IoT Security

The internet of things (IoT) brings has opened new horizons, from smart-city advancements to transforming how industries produce goods. For example, by connecting assets in a factory, manufacturers can have better insight into the health of their mach… Continue reading The Evolving Approach to IoT Security

SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’

Permalink
The post SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’ appeared first on Security Boulevard.
Continue reading SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’