Device security stories
Security and compliance challenges remain across distributed workforces
The rise of remote work in post-COVID Australia brings both flexibility and cyber risks, driving a complex landscape for IT and security.
SOTI Solves Troubleshooting and Security Issues for Trek
SOTI MobiControl and SOTI XSight allow Trek Bicycle Corporation to support and troubleshoot devices in minutes while saving 15-20% of time spent on employee onboarding.
Jigsaw24 partners Kandji for device management solutions
Jigsaw24 partnered with Kandji for its next-generation platform that enables centrally securing and managing devices, in addition to its Apple-first focus.
Video: 10 Minute IT Jams - An update from Devicie
Martin McGregor, Co-Founder and CEO of Devicie, shares why the company was created, how it is helping its customers, and what we can expect from it next.
Hundreds of devices declared missing by government departments
The findings of 14 Freedom of Information (FOI) requests to the UK's government departments has been released.
27.5% CAGR for network access control market in 2022-32: FMI
The report by Future Market Insights states that the network access control market is expected to reach a valuation of US$27,409.4 million by the end of 2032.
71,000 customers served by Jamf in managing Apple devices
The company is now helping approximately 71,000 active customers succeed with Apple and is running on about 30 million devices worldwide.
Ordr improves security and management of connected devices
It has implemented more than 80 integrations within the Ordr Data Lake while adding security enhancements to accelerate zero trust segmentation.
Forescout reveals top vulnerabilities impacting OT vendors
Forescout’s Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
How rugged devices can support organisations when the cloud goes out
The risk of businesses’ operational and technological footprints being impacted by extreme weather events continues to grow as climate change increases the frequency of such events.
As the threat landscape evolves, SASE security models may be the answer
"This survey confirmed that organisations have a gap when it comes to users, devices, and access security. To bridge this gap, organisations should progress to a Secure Access Service Edge (SASE) architecture."
TXOne Networks secures industrial operations with latest release
TXOne Networks, a global provider of ICS and industrial IoT (IIoT) security, has launched a new edition of its portable security device.
The long-tail of COVID-19 and the evolution of ransomware
The long-tail of COVID-19 means security teams are having to deal with user sprawl and device sprawl, causing big headaches in 2022.
Samsung outlines cybersecurity strategy for devices
"While we are generally more mindful today of the dangers posed by hackers to our laptops and computers, we also need to recognise that smartphones are prone to cyberattacks as well."
Trend Micro bolsters security offering with complete device and identity protection
The solution brings together identity theft and dark web monitoring, WiFi protection, password manager and parental controls.
Apple jumps on the Bluetooth tracker bandwagon pioneered by Tile
Apple has entered the market for Bluetooth trackers, pioneered by companies like Tile - but as always, Apple puts its own spin on things.
E-waste becoming a massive issue for businesses, so what can be done?
E-waste is a global concern, and is quickly becoming a crisis of its own, the researchers state. In fact, more than 53 million metric tons of e-waste was produced in 2019.
Nokia phones lead trust rankings finds Counterpoint research
Nokia phones are leading the Android ecosystem in providing the fastest software and security updates across the entire portfolio.
Come 2020, 70% of people will be using smartphones
By 2020, smartphone subscriptions will be more than double, reaching 6.1 billion, and 70% of the world’s population will be using smartphones.
The mobile enemy
Internal data theft can be minimised with a good strategy, if you do it right.
End to end protection
Check Point expert explains why you need endpoint security protection and policies.
Producing a network security policy
Planning a policy is the first step towards good security. Here's how you do it.