The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their…
Browsing CategoryConnected Devices
SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond
In the tech industry, “enterprise” is often equated to large businesses, but when it comes to enterprise mobility management (EMM), we should expand our definition. Why? Small and mid-size businesses…
Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT
The concept of unified endpoint management (UEM) typically implies the convergence of mobile device and PC endpoint management under a single team and management platform. But as the types of…
COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface
As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority of the workforce has shifted to remote work arrangements. Employee-owned…
Lock Down Personal Smart Devices to Improve Enterprise IoT Security
The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to…
Safeguarding Healthcare for the Future With Zero Trust Security
In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three…
How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk
Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected…
In 2020, IoT Security Must Be Part of Your Threat Management Strategy
Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise…
Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT
The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those…
Measuring Security Risk in a Medical IoT World
The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient…