Cisco doubles down on Internet of Things strategy, introduces IoT Threat Defense

(c)iStock.com/Brian Raisbeck

"This is an amazing year," Chuck Robbins, CEO of Cisco, proclaimed before the audience at the Cisco Internet of Things World Forum in London this morning. "This is the year where we're talking about how to put this into action. We really did move from great vision slides and talking about what's possible, and we saw more and more examples of how this is happening."

No prizes for guessing the topic of conversation. According to Cisco's own research, only 26% of enterprise IoT...

By James Bourne, 23 May 2017, 0 comments. Categories: Employees, Enterprise Mobility, IoT, Security.

Wandera secures $27.5 million, cites machine learning as key to future success

Enterprise mobile security provider Wandera has announced it has raised $27.5 million in a series C funding round, with promises of more products to come.

The funding, which more than doubles Wandera’s stake to date, takes the company’s total to $53.5m, with the latest round being led by Sapphire Ventures.

“With the financing under our belt, we relish the ability this has given us to deploy the funds and build out our technologies, our infrastructure and our team,” Eldar Tuvey, co-founder and CEO at...

By James Bourne, 19 May 2017, 0 comments. Categories: Enterprise Mobility, Security.

Signal Sciences raises $15m in series B round and launches ‘new category’ of web app security

Signal Sciences, a California-based security engineering provider, has raised $15 million (£11.6m) in series B funding as well as launching what it describes as a ‘new category’ of web application security solutions.

The Web Protection Platform (WPP), designed by former Etsy engineers and security leaders, aims to provide comprehensive threat protection for web applications, microservices, and APIs on any platform. Though building web apps is an essential and core part of every business, the...

By Enterprise AppsTech, 11 May 2017, 0 comments. Categories: Cloud , M&A, Security.

Why user behaviour continues to put enterprises at risk

No matter how rigorous an approach you take to security in the enterprise, your biggest threat to security will always be your users.

Though the so-called “user threat” has been well-known by IT professionals since the dawn of the computer, a new study commissioned by RiskIQ finds that the problem is extremely pervasive, and still poses a serious threat for consumer and enterprise app usage.

RiskIQ surveyed 1,000...

By App47, 09 May 2017, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Security.

Google shares its tiered approach to enterprise mobile security in new paper

Google has shed light on the tiered access method it employs in managing the devices of its more than 61,000 employees in a new whitepaper – with the aim to get IT admins to deploy it in their own organisations.

Michael Janosko, manager for security engineering and Rose La Prairie, Android product manager, explain the internal process in a company blog post. “Google’s technical...

By James Bourne, 28 April 2017, 0 comments. Categories: Employees, Enterprise Mobility, Security.

The enterprise manager’s checklist: Getting to grips with DDoS attacks and the botnet army

Distributed denial of service (DDoS) attacks jumped into the mainstream consciousness last year after several high-profile cases - one of the largest and most widely reported being the Dyn takedown in October 2016. While not necessarily a new threat - they have in fact been around since the late ‘90s - the Dyn takedown is an interesting example as it used poorly secured IoT devices to coordinate the attack.  

When you consider that by 2020 it is predicted...

By Ingo Schneider, 26 April 2017, 0 comments. Categories: IoT, Malware, Security.

US mobile app users facing increased security risks, new report argues

A nationwide survey of 1,000 US respondents commissioned by RiskIQ found that poor security awareness and an insatiable demand for mobile apps are placing US consumers’ identities and devices at risk.

More than one third (36%) of respondents do not consider an app’s details while nearly half (47%) never or only occasionally review the privacy policy and permissions requested by the app before downloading. This carefree attitude toward mobile apps is leaving such consumers vulnerable to cyber...

By Enterprise AppsTech, 11 April 2017, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Security.

Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

How EMM can help with General Data Protection Regulation compliance

There is a major global trend in compliance towards codifying into the law the concept of reasonable, common sense security standards. Compliance is moving away from compliance on paper to compliance in practice. The General Data Protection Regulation (GDPR), which will go into effect in May 2018, will bring Europe under one comprehensive data security and privacy legal regime. GDPR applies to controllers in the European Union (EU), as well as those located outside the EU if the individual whose personal data...

By MobileIron, 31 March 2017, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Security.

Key network strategies for the connected enterprise: DDoS protection, IoT, and more

Successful rollout of enterprise digital transformation continues to be a mixed bag. We continue to see the explosive increase in connected devices (the IoT phenomenon) and large advances in application capabilities to improve enterprise productivity. But we’ve also seen the challenges of securely implementing these technologies potentially delaying greater enterprise adoption.

Security certainly became the hottest issue in late 2016 in the aftermath of high-profile attacks. The

By Joe Raccuglia, 30 March 2017, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Majority of IT managers say they work on mobile security without EMM or MMS help

More than half of respondents in a survey conducted by mobility and telecom expense management (TEM) provider Tangoe say their job to manage mobile devices ploughs a lonely furrow.

In other words, of the 100 IT managers polled, across a variety of enterprises, very few are using enterprise mobility management (EMM) or managed mobility (MMS) offerings – although many plan to over the next two years.

Given this publication has

By James Bourne, 16 March 2017, 0 comments. Categories: Enterprise Mobility, Research, Security.

A note to CEOs: Shadow IT is not someone else’s problem

Trends like bring your own device (BYOD) and bring your own app (BYOA) – or shadow IT as some industry observers call it - are fast spreading throughout the workplace.

On the whole, they are welcomed by the enterprise for the additional flexibility and productivity benefits they bring.  After all, letting employees use their own phones and apps for work tasks saves time and investment on new IT, right?

But there’s a catch.

Alongside the benefits, shadow IT is also allowing fresh...

By Omri Sigelman, 16 March 2017, 0 comments. Categories: Applications, BYOD, CIO, Employees, Enterprise Mobility, Security.

Why your new enterprise app will fail: Avoid these classic pitfalls

(c)iStock.com/erhui1979

Last year, we wrote a blog post about what employees want in enterprise mobile apps. The key criteria were (and still are) simple: employees want apps that work, that make their lives easier, and that are easy to use.

Follow those guidelines, and it’s more likely than not that your app will succeed given the right infrastructure and strategy. But what about the opposite end of the spectrum: what are some signs your shiny new app might fail?

Nitesh...

By App47, 20 February 2017, 0 comments. Categories: Applications, Enterprise Mobility, Security.

Many local authorities lagging behind on BYOD, research warns

(c)iStock.com/pixsooz

Almost half of local authorities in England do not have a bring your own device (BYOD) policy in place, according to new research from Annodata.

The managed service provider submitted a freedom of information request to 79 council districts from all regions in England, and found 42% do not have BYOD implementation.

“The public sector in particular needs to approach BYOD with due diligence and special emphasis needs to be placed on security when employees are using their own devices...

By James Bourne, 16 February 2017, 1 comment. Categories: BYOD, Employees, Enterprise Mobility, Security.

How the CIO role has been ‘completely transformed’ in recent years through IT shift

(c)iStock.com/Akindo

One in three CIOs say their job role has been ‘completely transformed’ in recent years while another third say their job has become more important in their company’s hierarchy, according to a new piece of research from Bitdefender.

The study, titled ‘Virtualisation makes CIOs’ roles key’, surveyed more than 150 UK-based IT decision makers in companies with more than 1,000 PCs, and found some worrying security findings. Only 55% of incoming cyberattacks...

By James Bourne, 15 February 2017, 0 comments. Categories: CIO, Enterprise Mobility, Security.

How CSOs can avoid the shadow of a cybersecurity Groundhog Day

(c)iStock.com/LordRunar

Every year, in Pennsylvania, people gather in droves to watch a groundhog predict how much longer winter will last. For Americans, it’s a pretty big deal to see this glorified gerbil pop up and look terrified as throngs of onlookers wait in hushed silence to see whether the mighty Phil from Punxsutawney will see his shadow. 

Historically, the varmint is only 39% accurate, but in truth that’s probably better than most human non-groundhog meteorologists.

Like groundhogs,...

By Duncan Hughes, 14 February 2017, 0 comments. Categories: CIO, Security.

WebEx most popular enterprise app says MobileIron – yet organisational bad practices remain

(c)iStock.com/allvisionn

WebEx is the most popular enterprise app installed by MobileIron customers, with Dropbox, Facebook and WhatsApp among the most frequently blacklisted, according to a new report.

The study, the enterprise mobility management (EMM) provider’s third Mobile Security and Risk Review report, also found that almost 80% of firms are using more than 10 apps for business, with almost one in five (18%) using Apple’s Volume Purchase Program (VPP) – a number which goes up in...

By James Bourne, 13 February 2017, 0 comments. Categories: Applications, Data Loss, Enterprise Mobility, Security.

Skycure integrates with Microsoft EMS in enhanced mobile security play

(c)iStock.com/JasonDoiy

Mobile threat defence provider Skycure has announced it is collaborating with Microsoft on integrating its platform with Microsoft Enterprise Mobility + Security (EMS).

The collaboration ‘allows organisations to more confidently address the needs of today’s mobile workforce, ensuring that devices are risk-free and secure before accessing corporate resources’, according to the press materials.

Customers should expect ‘seamless integration’ with EMS,

By James Bourne, 09 February 2017, 1 comment. Categories: Enterprise Mobility, Microsoft, Security.

CISO research advocates ’30 day sprint’ to get privileged credentials up to date

(c)iStock.com/erhui1979

If you had a panel of Global 1000 chief information security officers (CISO) at your disposal, what would you ask them? A new report issued by CyberArk argues organisations can improve their security fitness and protect privileged credentials in a ’30 day sprint’.

The report outlines a ‘proven framework’ to implement a set of key controls around privileged credentials, noting that organisations can make gains ‘with a sufficient sense of urgency’. In...

By James Bourne, 08 February 2017, 0 comments. Categories: Data Loss, Employees, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit

(c)iStock.com/BrianAJackson

There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.