Microsoft Defender for Endpoint brings remote deployment to iOS

Credit to Author: Jonny Evans| Date: Thu, 06 Jan 2022 07:45:00 -0800

With the latest Microsoft Defender for Endpoint (MDE) preview for iOS, Microsoft has taken another step that should make life easier for IT administrators who need to secure remote iOS devices at the endpoint.

Endpoint protection without the user friction

The MDE preview includes a new capability to install Defender for Endpoint remotely and automatically on any devices enrolled in the service. The company first announced its intention to deliver the feature last month.

In practice, this seems relatively friction-free.

To read this article in full, please click here

Read more

5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read more

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800

While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.

Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.

“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

To read this article in full, please click here

Read more

Breaches, breaches everywhere, it must be the season

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Dec 2018 19:57:59 +0000

Where are all these major breaches coming from? What should we do if we are a victim? And how can we as a company prevent them?

Categories:

Tags:

(Read more…)

The post Breaches, breaches everywhere, it must be the season appeared first on Malwarebytes Labs.

Read more

Best Practices for Endpoint Detection and Response

Credit to Author: Trend Micro| Date: Wed, 24 Oct 2018 13:00:53 +0000

There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through…

The post Best Practices for Endpoint Detection and Response appeared first on .

Read more

Gartner recognizes Malwarebytes as a “Visionary” in the Magic Quadrant

Credit to Author: Marcin Kleczynski| Date: Fri, 26 Jan 2018 19:14:44 +0000

Gartner has recognized Malwarebytes as a “visionary” in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. Malwarebytes was selected for its completeness of vision and ability to execute.

Categories:

Tags:

(Read more…)

The post Gartner recognizes Malwarebytes as a “Visionary” in the Magic Quadrant appeared first on Malwarebytes Labs.

Read more

Windows Hello for Business: Next-gen authentication for Windows shops

Credit to Author: Jonathan Hassell| Date: Wed, 13 Sep 2017 04:01:00 -0700

Authentication: the act of proving one’s identity to the satisfaction of some central authority. To most, this process means typing in a username and a password. It’s been this way for years and years.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more