Collaboration Security: How to Safeguard Workstream Collaboration Data?

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...
BLACK HAT 2019: CULTIVATING A CULTURE OF SECURITY IN YOUR ORGANIZATION

BLACK HAT 2019: CULTIVATING A CULTURE OF SECURITY IN YOUR ORGANIZATION

As the Product Manager for Remote Support at BeyondTrust, it is important to keep up with security trends that affect the service desk. This was my first time attending Black Hat, and I was excited to catch Dino Dai Zovi’s keynote and sit in on breakout...
Collaboration Security: How to Safeguard Workstream Collaboration Data?

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...
Endpoint Protector KEXTs Notarized by Apple

Endpoint Protector KEXTs Notarized by Apple

With the release of the macOS Mojave 10.14.5, Apple has introduced a new security feature called kernel extension (KEXT) notarization. This marks a significant change in the way third-party kernel extensions are handled, more specifically it means that KEXTs signed...