UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust to working remotely. Naturally, the transition can be rocky for t… Continue reading UEM: Improving Device Security for Remote Workers

UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust to working remotely. Naturally, the transition can be rocky for t… Continue reading UEM: Improving Device Security for Remote Workers

Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security across the organization, according to Apricorn. The survey report, which pol… Continue reading Majority of IT departments leave major holes in their USB drive security

Zero Trust: Fortifying the Security Landscape

Here’s how zero trust can help organizations without impeding productivity The shifting cyberthreat landscape continues to be one of the greatest challenges organizations face today. The only constant we can rely on is that year in and year out,… Continue reading Zero Trust: Fortifying the Security Landscape

The Pitfalls of Keeping Your Ports Wide Open

By David Balaban
Based on security assessment results, penetration testers often recommend hiding an enterprise network’s ports behind a whitelist. However, corporate IT teams don’t always understand the need for such a countermeasure. Even some admins… Continue reading The Pitfalls of Keeping Your Ports Wide Open

How attackers exploit whitelists

If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way to bypass it. And, with the increase of number of security solutions implemented by organizations, it is to be expected that there will be some that can be made to play one against the other. As noted by freelance security consultant and ISC handler … More Continue reading How attackers exploit whitelists