Enterprise Mobility Management Gets Personal

Enterprise mobility management (EMM) is now widely adopted, with more than three-quarters of enterprises deploying the technology, according to IDC survey data. However, there are still roadblocks to end user adoption and penetration of the technology in terms of enrolled devices among users. Organizations with bring-your-own-device (BYOD), choose-your-own-device (CYOD) and…

Read More

The Expiration Date on Passwords Has Expired

Changing your passwords frequently sounds like commonsense advice, and has served as conventional wisdom in computer security for a long time. However, just because something is common doesn’t mean it makes sense. In fact, many experts believe forced, arbitrary password expiration actually does more harm than good. And with the…

Read More

Threat Intelligence Is the SOC’s Road Map to DNS Security

Remember the nervousness and excitement you felt when you took your driving test? You had to practice for weeks, complete the required paperwork and study countless traffic signs. The latter is especially important because these signs are used to warn and guide drivers. In cybersecurity, like in driving, the earlier…

Read More