Securing Mobile Devices and IoT: It All Starts with Dialogue
Securing Mobile Devices and IoT: It All Starts with Dialogue

Even on the best of days, protecting data can feel like a losing battle. This week, we skimmed headlines announcing more spyware found in over 500 Android apps. Thanks to the recent BlackHat and Def Con events, we have been learning just how it easy it is to hack everything from internet security cameras to hoverboards to a Tesla Model X. The short of...

READ MORE
Incident Response and the Power of Reach
Incident Response and the Power of Reach

By now, you’ve likely heard more about Absolute Reach and how you can deploy query and remediation tasks to your endpoint devices unlike anything before it. But did you know the power of Reach is only limited by your imagination? Absolute Reach empowers both PowerShell and Bash scripts and delivers powerful tools for system administrators and a security professionals that allows you to perform...

READ MORE
It’s Back-to-School: How Safe Are Your Endpoints?
It’s Back-to-School: How Safe Are Your Endpoints?

It’s back-to-school season which means plenty of preparation is underway – by families and schools. While students scramble to fill backpacks, get haircuts and buy new shoes, schools are also in a last minute push to ready their classrooms and the learning tools they rely on. An increasingly common alternative to the traditional computer lab on school campuses is the distribution of laptops and...

READ MORE