Every organization around the world is on a journey to cloud, each one facing the need to reinvent themselves with engaging omnichannel digital experiences to remain relevant in a hyper-competitive market. At the core of supporting a hybrid cloud environment is the need for a strong Identity and Access Management…
Read More
The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has…
Read More
IBM X-Force Incident Response and Intelligence Services (IRIS) researchers recently went down the rabbit hole of a physical iPhone theft that was followed by a SMiShing campaign designed to unlock the phone for resale on the black market. As we looked into what was behind the phish, we found a…
Read More
With the deployment of Android 10 on all new smartphones comes Android Enterprise, previously known as Android for Work. Even though it has its roots in Android 5.0 (Lollipop) launched in 2014, it is now a mandatory feature on all Android 10 devices when managed with an enterprise mobility management…
Read More