Business begins at the endpoint. Cheap puns aside, nearly all business processes, from employee collaboration to customer interaction, require the use of endpoints, whether they be smartphones, tablets, kiosks or virtual reality (VR) headsets. In this increasingly connected world, each of these endpoints align with complex use cases that have…
Read More
Airlines have long been a symbolic target for nation-state actors due to their close identification with their host countries, but that threat landscape has since widened considerably to include financially motivated attackers who are after customer data. The airline industry is facing an era of growth, which brings an increase…
Read More
Technology enables employees to work from the office, from home, during their daily commute and pretty much everywhere in between. Companies, however, have little control over security between the home and the office. Employees may choose to work from unsecured Wi-Fi networks in public places or when working remotely, for…
Read More
It’s no secret that passwords just aren’t very secret these days. Poor password hygiene and an overwhelming volume of digital accounts has influenced far many consumers to routinely reuse passwords across multiple accounts. As you might imagine, businesses have been hearing more and more about credential-stuffing attacks in the news.…
Read More