Qualys now supports macOS in its cloud security tools

Qualys, sometimes described as one of the pioneering SaaS vendors, has bent with the times to begin offering Mac support within its cloud security offering.

A pioneer in SaaS goes Mac

Since it launched in 1999, Qualys has traditionally offered its services to PCs, mobile devices, and cloud-native applications. The company’s original 2000 product, QualysGuard, was distinguished as one of the first to market vulnerability management tools.

To read this article in full, please click here

Read more

Uber data stolen via third-party vendor

Categories: News

Tags: Uber

Tags: data breach

Tags: Teqtivity

Tags: BreachForums

Tags: Uber Eats

Tags: mobile device management

Tags: MDM

Tags: Lapsus$

Tags: Lior Yaari

Tags: Grip Security

Uber is dealing with another cybersecurity incident after an attack on Teqtivity.

(Read more…)

The post Uber data stolen via third-party vendor appeared first on Malwarebytes Labs.

Read more

AWS brings Verified Access security to the Apple enterprise

Read more

Mosyle brings new iPhone, iPad endpoint security options

Mosyle is ramping up its wares with new security protections for iPhones and iPad adding more fuel to the Apple-in-the-enterprise fire.

Hardening and compliance options for iPhones and iPads

The company is unveiling its first endpoint security solution for IT admins overseeing fleets of mobile Apple devices. The idea is that the product, Mosyle Hardening and Compliance, ensures that employee devices are protected, compliant, and following the latest cybersecurity benchmarks.

To read this article in full, please click here

Read more

Jamf touts big boost to enterprise security at JNUC

Jamf opened its annual JNUC event for Apple admins today with a slew of announcements focused on device management and security, a new Jamf Trust app, further information on its recently announced ZecOps deal and other updates likely to be of interest to Apple IT professionals.

The company also committed to supporting Microsoft Device Compliance on Macs later this year, with support for Google’s context-aware zero trust framework (BeyondCorp) on iOS devices in early 2023.

To read this article in full, please click here

Read more

Jamf buys ZecOps to bring high-end security to Apple enterprise

The Apple-in-the-enterprise story continues to unfold, this week with Jamf’s announced plans to acquire mobile threat detection and response company ZecOps.

Already consumer-simple, Jamf becomes government secure

Jamf will likely reveal more about the motivations behind the deal at its JNUC event for Apple admins, which begins tomorrow. The purchase is the latest move by the Apple-focused enterprise MDM provider to supplement device management with an increasingly effective set of tools to bolster device security.

To read this article in full, please click here

Read more

What is Managed Device Attestation on Apple platforms?

Credit to Author: Jonny Evans| Date: Fri, 26 Aug 2022 09:43:00 -0700

Announced at WWDC 2022, Managed Device Attestation protection shows that Apple is adjusting device security protections to adapt to an increasingly distributed age.

Secure the endpoints, not the end times

This adjustment reflects a reality shift. Work doesn’t happen on specific servers or behind defined firewalls today. VPN access can differ across teams. And yet, in a workplace defined by multiple remote devices (endpoints), the security threat is greater than ever.

Managed Device Attestation works to create a second boundary of trust around which device management solutions can work to protect against attack.

To read this article in full, please click here

Read more

How Apple is improving single sign-on

Credit to Author: Jonny Evans| Date: Tue, 28 Jun 2022 07:59:00 -0700

Among a slew of announcements at WWDC this year were some important changes to Apple’s support for single sign-on (SSO). Here’s what’s coming when new updates ship this fall.

SSO + BYOD = iOS 16, iPadOS 16

Apple first introduced SSO support at WWDC 2019 with Sign in with Apple, which also saw the introduction of extensions to enable this kind of authentication. It allowed a user to access a service or website using their Apple ID, and meant support for identity providers, the use of highly secure token-based signatures and the tools service providers required to implement these systems.

To read this article in full, please click here

Read more