Microsoft Intune Suite consolidates endpoint management and protection

Microsoft has launched the general availability of Microsoft Intune Suite, a consolidation of its endpoint management and security solutions to streamline protection for cloud-connected and on-premises endpoints. 

The consolidation is aimed to serve as a single vendor for all endpoint security needs for the customers to have single analytics, rather than multiple disparate datasets, with a consistent visibility to potential vulnerabilities and anomalies, according to a company blog post.

To read this article in full, please click here

Read more

Apple finally adds encryption to iCloud backups

Apple today introduced several new security features focused on fending off threats to user data in the cloud, including end-to-end encryption for backups for iCloud users.

Along with end-to-end encryption for iCloud, Apple’s cloud storage and computing platform, the company announced iMessage Contact Key Verification, allowing users to verify they are communicating only with whom they intend.

apple advanced security advanced data protection inline.jpg.large Apple

Apple also announced hardware Security Keys for Apple ID, giving users the choice to require two-factor authentication to sign into their Apple ID account. (Hardware security keys use devices, such as USB thumb drives or near-field communication (NFC) dongles, to enable access to a service or application.)

To read this article in full, please click here

Read more

What is Managed Device Attestation on Apple platforms?

Credit to Author: Jonny Evans| Date: Fri, 26 Aug 2022 09:43:00 -0700

Announced at WWDC 2022, Managed Device Attestation protection shows that Apple is adjusting device security protections to adapt to an increasingly distributed age.

Secure the endpoints, not the end times

This adjustment reflects a reality shift. Work doesn’t happen on specific servers or behind defined firewalls today. VPN access can differ across teams. And yet, in a workplace defined by multiple remote devices (endpoints), the security threat is greater than ever.

Managed Device Attestation works to create a second boundary of trust around which device management solutions can work to protect against attack.

To read this article in full, please click here

Read more

Jamf adds network and endpoint security tools for enterprise Macs

Credit to Author: Jonny Evans| Date: Tue, 26 Apr 2022 07:46:00 -0700

Jamf has announced a series of significant updates to Jamf Protect, introducing a unique set of technologies designed to make enterprise devices more secure while also identifying and responding to incoming endpoint threats. The company also introduced, Jamf Trust, which aims to make this kind of security simple to use. (The latter is also available for Android and Windows.)

What’s new in Jamf Protect?

The big news for Mac security, Jamf Protect, now offers a comprehensive endpoint and network security solution, supplementing its existing protections with new tools for:

To read this article in full, please click here

Read more

Microsoft Defender for Endpoint brings remote deployment to iOS

Credit to Author: Jonny Evans| Date: Thu, 06 Jan 2022 07:45:00 -0800

With the latest Microsoft Defender for Endpoint (MDE) preview for iOS, Microsoft has taken another step that should make life easier for IT administrators who need to secure remote iOS devices at the endpoint.

Endpoint protection without the user friction

The MDE preview includes a new capability to install Defender for Endpoint remotely and automatically on any devices enrolled in the service. The company first announced its intention to deliver the feature last month.

In practice, this seems relatively friction-free.

To read this article in full, please click here

Read more

5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read more

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800

While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.

Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.

“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

To read this article in full, please click here

Read more