HackDig : Dig high-quality web security articles for hackers

4 Ways zIPS with Samsung Knox Transforms Mobile Devices Into High-Security Endpoints

Mobile device security hasn’t always been an enterprise’s top priority. The gradual evolution of smartphone technology, the intensely personal relationship between users and their devices, and the BYOD conundrum early on all contributed to that mindset. But, Samsung mobile devices can now be among the most secure endpoints in your enterprise. The transforma
Publish At:2020-08-05 19:17 | Read:95 | Comments:0 | Tags:Mobile Security Mobile Threat Defense BYOD mobile threat def

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already spend time on the job, while physically separated from the corporate campus. Sometimes t
Publish At:2020-06-30 13:48 | Read:157 | Comments:0 | Tags:Endpoint Mobile Security Risk Management BYOD Bring-Your-Own

What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices

The world has changed and we all know it. Mobile operations are at the forefront of every organization and so is mobile security. We’ve all seen attacks as simple as malicious apps, SMS phishing and man-in-the-middle attacks; to the more challenging, such as elevation of privileges, exfiltration of data and command and control manipulation. What you may not
Publish At:2020-05-24 07:37 | Read:330 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD cyber se

Top 5 Ways to Secure All Remote Workers with Microsoft & Zimperium

I had the pleasure of recently conducting a timely webinar on the Top Five Ways to Secure All Remote Workers with two executives from our partners at Microsoft – – Dave Randall, Senior Program Manager of Endpoint Manager, and Aasawari Navathe, Program Manager. The world changed overnight Even before the pandemic, it’s surprising how quickl
Publish At:2020-05-18 11:56 | Read:303 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD Complian

9 Best Practices from X-Force Red for Organizations and Employees

As employers rapidly respond to the need to protect their workforces from potential exposure and spread of the novel coronavirus, also known as COVID-19, many organizations are making the very difficult decision to pivot to a work-from-home model. This means employees will be connecting to corporate networks from whichever device is available: laptops, phone
Publish At:2020-03-18 16:57 | Read:528 | Comments:0 | Tags:Application Security CISO Data Protection Threat Intelligenc

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:4247 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:869 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Zimperium Integrates Mobile Threat Defense into Microsoft Defender Advanced Threat Protection

The days of “leaving work at your desk” are long gone. Today, employees are mixing business with pleasure at all hours, in different places. It could be checking your email at halftime of your daughter’s soccer game; reviewing an Excel sales forecast spreadsheet while waiting for a friend at dinner; or, finishing up an overseas partner call while in line fo
Publish At:2020-01-23 17:25 | Read:779 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD mobile d

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:1018 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:1790 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Don’t Let Liberating Your Employees Give Freedom to Hackers

Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior.  The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of this, he would allow them to work from home on their mo
Publish At:2019-09-19 14:33 | Read:971 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises. The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprises. “The mobile ecosystem in an ente
Publish At:2017-10-04 22:40 | Read:6076 | Comments:0 | Tags:Breaking News Mobile Reports Security blacklisted apps BYOD

Cyber Security Risk: You Can’t Secure It If …

In the course of working with our clients to improve their security posture, I have come across several common themes that often limit a business’s ability to assess and mitigate cyber security risk. Let’s take a look at some of these themes and real-world examples of how they apply. You can’t secure it if…You Don’t Know It̵
Publish At:2016-12-15 06:50 | Read:4956 | Comments:0 | Tags:Featured Articles Risk Management BYOD hack IoT

Healthcare Security and your Doctor’s Cellphone

Healthcare Security and your Doctor’s Cellphone Posted by David Harley on April 7, 2016.I was asked for my response to Skycure’s mobile threat intelligence report, which claimed that ‘One in Five Doctors’ Mobile Device Might be at High Risk’. Not that I’ve
Publish At:2016-04-07 14:55 | Read:3544 | Comments:0 | Tags:David Harley BYOD CYOD mobile security NHS Skycure

BYOD Makes Application Security a Matter of National Security

Several publications have commented on a new study from Harvard’s Berkman Center for Internet and Society. The study was called “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” Apple and others have designed products with so-called “end-to-end encryption,” meaning that a message between two users can
Publish At:2016-02-12 14:05 | Read:5348 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web


Tag Cloud