Archive for the ‘Endpoint Management’ Category

In the 1930s, when Louis A. Simon designed the famous U.S. Bullion Depository at Fort Knox, he could only have hoped that the building would be so secure, so impenetrable, that generations of Americans would come to regard “Fort Knox” as the highest compliment that could be given to a structure whose purpose is to [...]

If a group is really only as strong as its “weakest link,” then why are so many enterprises, which are otherwise concerned about their network security, so quick to add new “links”? Every new user that gains privileged network access increases the risk that one link in the chain could break, thereby jeopardizing the entire [...]

Is your enterprise one of the many that are “subject to the whims of fickle consumer-business users” when it comes to adopting new technology? That’s how Clorox CIO and vice president Ralph Loura framed the current state of enterprise tech and the Bring Your Own Device (BYOD) trend when he appeared earlier this month among [...]

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous devices and operating systems to access their networks. As a compromise between employees and employers that brings everyone onto the same page, a BYOD policy helps. But, it [...]

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a “sophisticated threat actor,” likely through a brute force password attack. Although the utility company repelled the attack, and there is no evidence that operations were affected, the DHS’ Industrial Control [...]