Endpoint Device Controls for Secure Remote Working

By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   Endpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide shift to remote workforce model, we are witnessing two maj… Continue reading Endpoint Device Controls for Secure Remote Working

Kandji announces $3.375M seed for sophisticated Apple MDM solution

Kandji, a new Apple MDM solution that promises to go far beyond Apple’s base MDM protocol and other solutions on the market, emerged from stealth today with a $3.375 million seed investment. The product is also publicly available for the first time starting today. The round, which closed in March, was led by First Round […] Continue reading Kandji announces $3.375M seed for sophisticated Apple MDM solution

Audio Security – PSW #620

Audio Security
The post Audio Security – PSW #620 appeared first on Security Weekly. Continue reading Audio Security – PSW #620

iOS, Equifax Is Back, & phpMyAdmin CSRF Zero-Day – PSW #620

iOS, Equifax Is Back, & phpMyAdmin CSRF Zero-Day
The post iOS, Equifax Is Back, & phpMyAdmin CSRF Zero-Day – PSW #620 appeared first on Security Weekly. Continue reading iOS, Equifax Is Back, & phpMyAdmin CSRF Zero-Day – PSW #620

Mobile App Security At Scale: Brian Reed, NowSecure – BSW #142

Mobile App Security At Scale: Brian Reed, NowSecure
The post Mobile App Security At Scale: Brian Reed, NowSecure – BSW #142 appeared first on Security Weekly. Continue reading Mobile App Security At Scale: Brian Reed, NowSecure – BSW #142

Apple is making corporate ‘BYOD’ programs less invasive to user privacy

When people bring their own devices to work or school, they don’t want I.T. administrators to manage the entire device. But until now, Apple only offered two ways for I.T. to manage its iOS devices: either device enrollments, which offered device-wide management capabilities to admins or those same device management capabilities combined with an automated […] Continue reading Apple is making corporate ‘BYOD’ programs less invasive to user privacy

Mobile Risks Boom in a Post-Perimeter World

The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world. Continue reading Mobile Risks Boom in a Post-Perimeter World

Application News – Application Security Weekly #60

    Firefox gives more scrutiny to add-ons but Firefox also forgot to give more scrutiny to a cert, Path traversals trampled by ransomware, Secure Software Design: The Next Frontier In Cybersecurity, Trust the Stack, Not the People, VRT adds a CAN, and… Continue reading Application News – Application Security Weekly #60

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay. Continue reading Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats