You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 122 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Post remove

Your search for mobile device management/ returned 122 results

Sort Results:

Relevant Recent
Reviews, Security News

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Mobile Security, Privacy & Compliance News and Analysis, Security News

Apple claims to have removed parental control apps from App Store over privacy concerns

Apple Monday defended the recent removal of multiple parental control apps from the App Store, saying it did so over privacy concerns. “We recently removed several parental control apps from the App Store, and we did it for a simple reason: they put users’ privacy and security at risk,” according to a company statement. The tech…
Editorial, Mobile Security, SC Security Ops Center, Security News

Handcuffing the mobile octopus

MDM strategies: An embarrassment of niches It is Christmas Day at 2 a.m. and a new mobile device just connected to your network. Your servers are configured to send a text message to alert you when new devices connect, so you immediately know that something has happened. But you have no policy that requires that…
Executive Insight, Opinion, Security News

Mobile Device Security for Blue Collar Workers

From blue-collar to new-collar When we picture the typical technology worker, many of us naturally think of an office worker who spends most of their day chained to a desk, sitting in a home office or getting WiFi at a Starbucks. But that view of the tech worker is increasingly too limited. These days, with…
APTs/cyberespionage, Cloud Security, Coronavirus, Phishing, Security News

COVID-19 accounts for most 2020 cyberattacks

The pandemic has served as a catalyst for much of the hacking increases during the first half of 2020, with weekly COVID-19-related phishing attacks growing from under 5,000 in February to more than 200,000 in late April. All types of cyberattacks were up 34 percent from March to April, according to Check Point’s mid-year report.…
Coronavirus, Data Breach, Phishing, Privacy & Compliance News and Analysis, Security News

Corporate VPNs in danger as vishing attacks target home workers

Multiple hacking gangs are preying on remote workforces and corporate VPNs through vishing attacks that are more efficient, dangerous and ubiquitous than ever, prompting the U.S. government to issue both a warning and advice on how to thwart them. “The news has spread throughout the hacker community and multiple groups are now doing this,” said…
InfoSec Insider

How to Manage Employee Mobile Device Risk in Your Organization

In this article, we’ll go over what devices infosec departments should have an eye on and how to tackle the challenge of BYOD head-on. For an expert’s perspective, we spoke to Georgia Weidman, founder of Shevirah, a mobile and IoT testing company.

Asset management
InfoSec Insider

Know Your Inventory: A CISOs Guide to Asset Management

A CISO’s list of responsibilities are vast. They need to protect, defend, and identify any risks and potential attacks that may hit their company’s environment. However, knowing what needs protection is its own challenge.

Executive Insight, Opinion

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…
Next post in Executive Insight