You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 61 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Doug Olenick remove

Your search for mobile device management/ returned 61 results

Sort Results:

Relevant Recent
Mobile Security, Security News, Vulnerabilities

A weakness in Apple’s DEP authentication leaves users open to attack

Researchers have noted a lack of authentication in the  Apple Device Enrollment Program that could allow a malicious actor to steal Wi-Fi passwords and VPN configurations. The vulnerability was dug out by Duo Labs who found Apple’s device enrollment program (DEP) has an authentication weakness that can be exploited when organizations use Apple’s mobile device…
Executive Insight, Opinion, Security News

Mobile Device Security for Blue Collar Workers

From blue-collar to new-collar When we picture the typical technology worker, many of us naturally think of an office worker who spends most of their day chained to a desk, sitting in a home office or getting WiFi at a Starbucks. But that view of the tech worker is increasingly too limited. These days, with…
Executive Insight, Opinion

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…
Corporate News, Security News

Sophos brings on DarkBytes

Sophos has acquired the endpoint security company DarkBytes. The companies did not release the financial details of the agreement, but Sophos said it plans to use DarkBytes technology as the foundation for new managed detection and response andSecurity Orchestration Automation Response services it plans to offer. “The strength and architecture of the DarkBytes platform will accelerate…
Reboot Leadership Awards 2019

Dani Martínez – IOActive

Why nominated: Dani Martínez proved to be a self-starter. Beginning his career in IT, he soon developed an interest in cybersecurity and began taking online courses in his spare time. Martínez dove right in and began a cybersecurity blog where he not only showcased his work, but was able to display his hacking skills. This…
Data Breach, Security News

2020 Predictions: Data Breaches

Experian predictionsCybercriminals will leverage text-based “smishing” identity theft techniques to target consumers participating in online communities. As more Americans continue to join like-minded groups on social media to provide financial support to social causes or political candidates, cybercriminals can solicit unsuspecting consumers with fraudulent messages via SMS text to seek bank account details or other…
Trend Micro Smart TV
Security News

FLocker ransomware now targeting Smart TVs

Having a favorite character killed off on "The Walking Dead" may no longer be the worst thing that can happen while watching TV as Trend Micro researchers have found the first major example of ransomware that can attack a Smart TV with hackers using an updated version of FLocker that targets devices running the Android operating system.
Executive Insight, Opinions

Tackling the security complexity in 5G IoT devices

By Yogendra Shah, Senior Principal Engineer, InterDigital IoT is one of three major use cases driving the development of 5G and it brings untold complexity and inherent risk that threatens to undermine the opportunity even before it gets started. 5G networks are expected to connect tens of billions of IoT devices, and, as opposed to…
Next post in Opinions