Generative Data Intelligence

Tag: MobileIron

Third Ivanti Vulnerability Exploited in the Wild, CISA Reports

A critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2023-35082, has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog.The vulnerability has...

Top News

Forescout Appoints Technology Veteran Barry Mainz as CEO

SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout Technologies Inc., the global leader in compliance and cybersecurity for all connected devices, today announced that Barry Mainz will join...

Ericom Software Appoints Leading Executives to Newly Formed Industry…

We are excited and honored to be able to work with this experienced and diverse group of professionals who believe...

QR codes serve up a menu of security concerns

Quick Response (QR) codes are booming in popularity and hackers are flocking to exploit the trend. Worse, according to a new study, people...

Oculus Quest for Business: An Enterprise-focused Overview of Capabilities & Caveats

Last month Oculus released the Oculus for Business program for enterprise customers. The company promises a secure and reliable VR solution for...

Week in review: Windows RDP backdoor, GDPR enforcement, application threats and security trends

Here’s an overview of some of last week’s most interesting news and articles: How do I select a backup solution for my business?In order...

Week in review: Trojanized hacking tools, coronavirus scams, (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, articles and podcasts: The haphazard response to COVID-19 demonstrates the value of enterprise...

Passwords still dominant authentication method, top cause of data breaches

Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?