The Other Half of the Equation: Why UEMs Need MTD

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “Enterprises with average security requirements that do not provide much more than email to their mobile users, address mobile security today by establishing a security baseline and enforcing it via unified endpoint management (UEM).”  UEM is a class of software tools that provide a single management … Read More

The Other Half of the Equation: How MTD Completes EPP/EDR

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down, the two areas have reached similar levels of maturity. The convergence between mobile and more-traditional endpoints will increasingly allow security leaders to define common endpoint security strategies for all endpoint devices.”  As such, it’s important … Read More

Malicious Websites Have Been Exploiting iOS Devices For Years

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our … Read More

New iOS Jailbreak Tools put Organizations at Risk

According to iDownloadBlog.com (iDB), “in an unforeseen turn of events, hacker Pwn20wnd released v3.5.0 of the unc0ver jailbreak tool to the general public Sunday morning with official support for iOS 12.4, the latest available firmware release from Apple with support for Apple Card.”  While users wanting to bypass existing Apple operating system precautions and take … Read More