recentpopularlog in

jonerp : mobileiron   8

What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
november 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp

Copy this bookmark:





to read