How Do You Measure the Success of Your Patch Management Efforts?

With the recent shift in attack focus toward operating systems and the increase in publicized breaches and ransomware attacks, patch management is now essential for organizations.

The post How Do You Measure the Success of Your Patch Management Efforts? appeared first on Security Intelligence.

Continue reading How Do You Measure the Success of Your Patch Management Efforts?

The Imperative and Opportunity of Ruggedized and IoT Device Management

Increasingly, businesses are focusing more on ruggedized and IoT device management, compliance of their endpoints, and developing an overall strategy to secure these types of devices.

The post The Imperative and Opportunity of Ruggedized and IoT Device Management appeared first on Security Intelligence.

Continue reading The Imperative and Opportunity of Ruggedized and IoT Device Management

iOS 11 in the Enterprise: Get Your iPads Ready

The upcoming release of Apple iOS 11 will bring significant changes to the enterprise in the form of enhanced customization, discoverability and more.

The post iOS 11 in the Enterprise: Get Your iPads Ready appeared first on Security Intelligence.

Continue reading iOS 11 in the Enterprise: Get Your iPads Ready

O Me, O My! Android O and Its Impact on the Enterprise

Google’s Android O version 8.0 features a safe browsing API and other functions to improve mobile application security in the enterprise.

The post O Me, O My! Android O and Its Impact on the Enterprise appeared first on Security Intelligence.

Continue reading O Me, O My! Android O and Its Impact on the Enterprise

The Increasing Dangers of Code Hooking

Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.

The post The Increasing Dangers of Code Hooking appeared first on Security Intelligence.

Continue reading The Increasing Dangers of Code Hooking