• August 17, 2022

    As the Data Explosion Ramps Up, Security Vulnerabilities Grow Exponentially Several new studies make it clear that the data explosion is far bigger than most people could ever have imagined. Some say that it has gone past the point where...

  • August 10, 2022

    Four Big Trends In Mobile Device Management Mobility has progressed, in recent years, to the point where some enterprise users hardly ever need to use a laptop or desktop. Many CEOs, for example, only use their phone. Any desktop duties...

  • August 9, 2022

    Unified Endpoint Management Enters the Mainstream Once upon a time, there was anti-virus. Then anti-spam, adware, malware protection, ransomware protection, mobile device protection, and on and on. As new threats appeared, the vendor community came out with a fix. According...

  • August 8, 2022

    Flaws, Bugs, Zero Days, and Breaches: Welcome to the New Normal Endless bad news typically results in people becoming inured to it. The recent media 24-7 death counts on COVID-19 caused many people to switch off. It was just too...

  • August 5, 2022

    Mobility Linked to Surge in Cybercrime An endpoint ecosystem study by Mobile Mentor found a direct correlation between the rise in mobility and a recent surge in cybercrime. With the pandemic forcing people to work remotely and to rely on...

  • August 2, 2022

    Passwords Will Get Hacked: Be Ready May 5th of 2022 was celebrated as World Password Day. News stories were everywhere about how to improve password security, the best ways to implement multi-factor authentication, why a stronger password policy was needed,...

  • August 1, 2022

    Case Study: How Organizations Can Affordably Gain Security Technology and Expertise Faced with a shocking increase in security threats – a 500% increase in cybercrime in the last two years, according to one study – many organizations have responded by...

  • July 29, 2022

    Four Top Endpoint Protection Trends Endpoint protection has always been a vibrant marketplace. From the early days of intense anti-virus competition to the security package wars between McAfee, Symantec, and Trend Micro, this has never been a dull area. And...

  • May 14, 2022

    Business Email Compromise Attacks on the Rise Increased BEC Attacks Business Email Compromise (BEC) breaches are turning into the go-to strategy for cybercriminals. The FBI’s Internet Crime Complaint Center (IC3) reports that Business Email Compromise (BEC) schemes within the U.S...

  • May 13, 2022

    Who Is Securing Our Systems? The Question of Security With compute environments being so distributed and so cloud oriented, confusion is inevitable, particularly on the security side. Within organizations, applications and data are split between on-premises systems and the cloud....