James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it…
Browsing CategoryMobile Devices
Private LTE or 5G: Which Is More Secure?
Employees using mobile devices for work is nothing new. From health care workers using them for patient care to a salesperson checking work email in an airport, most of us…
Cybersecurity Today: The Intersection of Technology and Behavior
In the movie “Back to the Future II,” protagonist Marty McFly travels forward to the year 2015. During a quick stop at Café 80s, Marty encounters two children, confused by the…
Don’t Remove Stalkerware Before Reading This Article
Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else can…
Don’t Remove Stalkerware Before Reading This Article
Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else can…
Why Zero-Click Cyberthreats Should Be on Your Radar
For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost…
Managed Data Activity Monitoring (DAM) Is More Important Than Ever
The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and…
SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond
In the tech industry, “enterprise” is often equated to large businesses, but when it comes to enterprise mobility management (EMM), we should expand our definition. Why? Small and mid-size businesses…
Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT
The concept of unified endpoint management (UEM) typically implies the convergence of mobile device and PC endpoint management under a single team and management platform. But as the types of…
COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface
As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority of the workforce has shifted to remote work arrangements. Employee-owned…