Pathways to Unified Endpoint Management (UEM)
Would you like to learn more Unified Endpoint Management (UEM) – and of course security – strategies? If so, please register for my November 12 webinar!
Title: Pathways to Unified Endpoint Management (UEM)
A Two Factor Authentication Makeover for your Protection
Cybercrime. SpyEye. Zeus. Anonymous. APT1. PRISM. Bullrun. Hackers of every sort are everywhere. As I wrote in “TrustNo One Device (Part 2)” and “Direct Memory Access (Again)” you have no assurance your device isn’t … Continue reading
The Mobile Security Gap
No one has fully figured out how to throw a security blanket over the enterprise mobile environment, that chaotic patchwork of geographies, carriers, operating systems, applications, device types and ownership models.
Any enterprise tackling web security for mobile devices must… Continue reading
Out of the Box Thinking on Password Policies
For all that authentication vendors may proclaim “the death of passwords,” the pesky things aren’t going away. In fact, I don’t think they should. However, I’ll be the first to acknowledge how broken password authentication is in current practice. Sardonically… Continue reading
Direct Memory Access (Again)
My wife’s always “watching the detectives” (per the title of that old Elvis Costello song) and sometimes I join her. But nowadays she’s not “filing her nails as they’re dragging the lake,” instead she’s painting her toenails as the NCIS… Continue reading
Trust No One Device (Part 2)
My advice from the first Trust No One (Device) hasn’t sunk in. Levels of end user compromise are far too high, complacency reigns about mobile phone security and the risks of social networks and cloud-based storage are becoming more… Continue reading
Trust No One (Device)
In the age of the advanced persistent threat (APT) – a euphemism for China, the NSA, cybercrime Mafia groups or your bogeyman of choice – security pros are telling enterprise customers to “Assume you’re already compromised.” I’m in… Continue reading
Account Recovery May be the Weakest Link
About a year ago, I read an article in Wired by Mat Honan called “How Apple and Amazon Security Flaws Led to My Epic Hacking.” At the time I was working as one of Gartner’s two main anti-malware… Continue reading