Resources

Smart@work Blog

mobile security

Ellie Ruano | February 12, 2018

Industry First: No user action required to get mobile threat protection

Did you know that if you want users to deploy a security application on their mobile device, according to the industry average only 50-60% of users will actually do it over a three-month period? This adoption rate increases to more than 80% if it is...

Read More →
Ojas Rege | January 10, 2018

Mobile Mitigations for Meltdown and Spectre

Meltdown and Spectre are two critical vulnerabilities recently identified in modern processors. These vulnerabilities can allow unprivileged users to access memory belonging to other processes, including the kernel. Much of the initial coverage of these vulnerabilities centered on desktop, server, and cloud systems...

Read More →
Timothy Jackson | May 17, 2017

WannaCry

Whenever history seemed to repeat itself, my Granny used to quip, “same song, different verse.” As the WannaCry (WNCRY) ransomware spread like wildfire in a dry forest, I heard the familiar refrain and discordant notes of previous worms: Blaster (2003), Welchia “Nachi” (2003), and Conflicker (2008). Each of these worms spread via well known flaws in...

Read More →
Timothy Jackson | March 30, 2017

NY - Cybersecurity Regulations

The web of security and privacy regulations continues to grow this month as the New York Department of Financial Services (DFS) became the latest regulator to impose cybersecurity...

Read More →
Ojas Rege | March 28, 2017

EMM-CA-Law

There is a major global trend in compliance towards codifying into the law the concept of reasonable, common sense security standards. Compliance is moving...

Read More →
Timothy Jackson | March 10, 2017

Secure the Internet of things

“It always seems impossible until it’s done.” – Nelson Mandela

Researchers at Google and the CWI Institute in Amsterdam recently announced that they had successfully found a SHA-1 collision. In other words, they found two messages that produce the same output when run through the SHA-1 hash algorithm. This is a...

Read More →
David Schwartzberg | February 23, 2017

Last week, I attended the RSA Conference and spent some time talking to colleagues, Tim Jackson and Sean Ginevan, as well as Domingo Guerra, President and Founder of MobileIron's Ecosystem Partner,...

Read More →
Fran Thorpe | February 22, 2017

Healthcare Industry Has Highest Adoption of Apple DEP and VPP
Every February the Moscone Center in San Francisco becomes the destination to learn the latest on how “to fight cyber threats and proactively manage risk” (RSA Conference). This year, the halls were crowded with information on...

Read More →
James Plouffe | February 13, 2017

Healthcare Industry Has Highest Adoption of Apple DEP and VPP

The healthcare industry lives on the bleeding edge of mobility, claiming some of the most innovative and life-changing use cases for mobile technology. Security is a top concern for most industries, but this is especially true in healthcare. From patient records to payment information, healthcare organizations face strict regulation...

Read More →
Sean Frazier | December 21, 2016

Sometimes You Just Have to Be Certified
Who would have thought in this year 2016 (almost 2017) I would be writing a blog post about S/MIME? Having spent my formative computing years at cc:Mail (and later Lotus), I spent a lot of time working with public sector companies and espousing the wisdom of securing your email using this offshoot version of PKI. Later, I would work at...

Read More →

Pages