You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 129 results

Your search for mobile device management/ returned 129 results

Sort Results:

Relevant Recent
Reviews, Security News

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…
Product Review

Hexnode 8.2

Hexnode offers enterprise-wide endpoint management for both personal and corporate-owned devices, all on a single console. This product comes with a variety of customizations and top-of-the-line support. Hexnode is sleek and, overall, well organized. The dashboard layout shows a high-level overview of device and user information. Unfortunately, it has no widget configuration capability that would…
Mobile Security, Security News, Vulnerabilities

A weakness in Apple’s DEP authentication leaves users open to attack

Researchers have noted a lack of authentication in the  Apple Device Enrollment Program that could allow a malicious actor to steal Wi-Fi passwords and VPN configurations. The vulnerability was dug out by Duo Labs who found Apple’s device enrollment program (DEP) has an authentication weakness that can be exploited when organizations use Apple’s mobile device…
Product Review

Sophos Mobile 9.0

The Sophos Mobile Device Management platform (which may shortly be rebranded as InterceptX for mobile) is a native endpoint security solution that integrates with third-party solutions to reduce time and effort spent on managing traditional and mobile endpoints without inhibiting productivity. We initially struggled to set up this site. Eventually, we had to open a…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Mobile Security, Privacy & Compliance News and Analysis, Security News

Apple claims to have removed parental control apps from App Store over privacy concerns

Apple Monday defended the recent removal of multiple parental control apps from the App Store, saying it did so over privacy concerns. “We recently removed several parental control apps from the App Store, and we did it for a simple reason: they put users’ privacy and security at risk,” according to a company statement. The tech…
Editorial, Mobile Security, SC Security Ops Center, Security News

Handcuffing the mobile octopus

MDM strategies: An embarrassment of niches It is Christmas Day at 2 a.m. and a new mobile device just connected to your network. Your servers are configured to send a text message to alert you when new devices connect, so you immediately know that something has happened. But you have no policy that requires that…
Executive Insight, Opinion, Security News

Mobile Device Security for Blue Collar Workers

From blue-collar to new-collar When we picture the typical technology worker, many of us naturally think of an office worker who spends most of their day chained to a desk, sitting in a home office or getting WiFi at a Starbucks. But that view of the tech worker is increasingly too limited. These days, with…
InfoSec Insider

How to Manage Employee Mobile Device Risk in Your Organization

In this article, we’ll go over what devices infosec departments should have an eye on and how to tackle the challenge of BYOD head-on. For an expert’s perspective, we spoke to Georgia Weidman, founder of Shevirah, a mobile and IoT testing company.

Asset management
InfoSec Insider

Know Your Inventory: A CISOs Guide to Asset Management

A CISO’s list of responsibilities are vast. They need to protect, defend, and identify any risks and potential attacks that may hit their company’s environment. However, knowing what needs protection is its own challenge.

Next post in InfoSec Insider