SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Collaboration Security: How to Safeguard Workstream Collaboration Data?

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...

read more

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...

read more

BLACK HAT 2019: CULTIVATING A CULTURE OF SECURITY IN YOUR ORGANIZATION

As the Product Manager for Remote Support at BeyondTrust, it is important to keep up with security trends that affect the service desk. This was my first time attending Black Hat, and I was excited to catch Dino Dai Zovi’s keynote and sit in on breakout...

read more

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...

read more

Endpoint Protector KEXTs Notarized by Apple

With the release of the macOS Mojave 10.14.5, Apple has introduced a new security feature called kernel extension (KEXT) notarization. This marks a significant change in the way third-party kernel extensions are handled, more specifically it means that KEXTs signed...

read more

DOES YOUR REMOTE SUPPORT SOLUTION HAVE FIPS 140-2 VALIDATION? HERE’S WHY IT MATTERS

Earlier this week, BeyondTrust announced that we have been awarded a Level 2 Federal Information Processing Standards Publication (FIPS) 140-2 validation for our Remote Support B300 appliance. BeyondTrust has the only Remote Support solution that...

read more

Software Vulnerability Management Protect your business software against cybersecurity risks-Recent RDS Vulnerability, and What EOL Software Means for You

Once again, a vulnerability has been discovered in older Microsoft Windows operating systems that will likely lead to some long nights and grumpy IT personnel. When a situation like this presents itself the first thing that should be done is to take a deep...

read more

Logical Operations Releases “Everyday Data Science” Certification

The demand for data science skills is growing in companies and organizations of all sizes.  While Artificial Intelligence and Machine Learning are changing the way product developers and engineers build intelligent automobiles and medical devices, business people...

read more

What’s New in Endpoint Protector 5.2.0.6

The new version of Endpoint Protector is out and is set to deliver a new series of improvements and upgraded features. This article lists the most important updates and enhancements of Endpoint Protector 5.2.0.6 that are of interest to our clients....

read more

5 Steps to Protect Data at a Small Business

Data protection is more important than ever today for small businesses. Large corporations and governments were once the favored targets for hackers but those days are gone. The availability of hacker starter kits, easily purchased on the dark web, has given rise to a...

read more

BEYONDTRUST UNVEILS NEW INTEGRATIONS, PRODUCTIVITY, & SECURITY ENHANCEMENTS WITH VERSION 5.4 RELEASE OF PRIVILEGE MANAGEMENT FOR WINDOWS AND MAC

BeyondTrust is pleased to announce the 5.4 release of Privilege Management for Windows and Mac (PMWM) (formerly Avecto Defendpoint), our market-leading solution for enabling users and administrators to work securely and efficiently on desktops and...

read more

Terminate Malware – Prevent your Endpoints from Cyberattacks

Digitalization opens up new business models and lays the foundation for process optimization. The shift to digitalized processes does have its downsides, though. For example, cyberattacks are an absolute nightmare for companies of all sizes. There is, however, an...

read more

European banks fall down on phishing protection

Up to a quarter of major European banks are not providing best practise phishing protection to their customers according to a survey from Sectigo, a cyber security analyst firm.The firm looked at banking websites and rated them based on the presence of SSL certificate...

read more

Multi-Cloud Policy Automation for Any Cloud and Service

According to the RightScale 2018 State of the Cloud Report, 8 out of 10 enterprises are using more than one cloud typically combining multiple public cloud providers along with private clouds or cloud-enabled virtualized environments. The use...

read more