Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MDM alone can't meet your compliance goals

This blog has been adapted from a section of 1Password’s ebook: “Why MDM isn’t enough for device security”. To read the complete ebook, click here. For years, global regulations and compliance standards have been a primary driver of Mobile Device Management’s (MDM) adoption in the workplace. This is thanks to its ability to force managed devices, en-masse, into meeting basic levels of compliance.

Introducing Jit's Seamless Integration with the Checkmarx One SAST Solution

Balancing security and developer experience has always been a challenge. On one hand, teams need best-of-breed security scanners to minimize false positives and surface the most critical vulnerabilities. On the other, too many disparate security tools create complexity, slowing developers down. The key to effective security is combining best-in-class scanning with a unified and intuitive developer experience.

Security Bulletin: QakBot/Qbot Malware

QakBot (also known as Qbot or Pinkslipbot) is a highly adaptive malware that has evolved over the past decade to evade security defenses. Initially developed as a banking trojan to steal financial data, it has since expanded its capabilities, employing advanced evasion techniques and a modular architecture to facilitate credential theft, lateral movement, and ransomware deployment.

Next-Generation Secure Online Tutoring: Transformations and Breakthroughs in EdTech

Education has transformed dramatically, with online tutoring emerging as a key player in modern learning. Students and educators now seek more secure, interactive, and personalized platforms to enhance the digital learning experience. However, with this shift comes the need for security, accessibility, and innovation. Online tutoring platforms must adapt by integrating cutting-edge technology while ensuring a safe and efficient learning environment. Let's explore the latest breakthroughs shaping next-generation online tutoring.

Why Zero Trust Security Is Essential for Modern IT Infrastructure

In the modern IT landscape, cybercriminals are becoming more sophisticated and intentional about their attacks. Tools that help drive technological development are also being used as weapons against under-educated consumers. Between ransomware, phishing, and AI attacks, businesses must work harder than ever to protect their data effectively.

Optimising Supply Chain Cyber Security is Critical to the UK Healthcare and Pharmaceutical Sector

The potential impact on the UK healthcare and pharmaceutical industry from cyber-attacks is front-of-mind for a number of key reasons, including how critical these industries are to everyday life. First, the Intellectual Property (IP) at the operational epicentre of these businesses - collectively worth hundreds of billions in R&D investment annually - makes the pharmaceutical industry an increasingly attractive target for cyber threat actors.

Vivek Ramachandran to Speak at Black Hat Asia's 2025 Financial Services Summit on the Evolving Cyber War Against State Actors

PALO ALTO, Calif., - 19 March 2025 - Vivek Ramachandran, Founder of SquareX and a cybersecurity veteran with over two decades of experience, will speak at the Black Hat Asia Financial Services Summit on April 2 2025 at Marina Bay Sands, Singapore. His talk, The War Against State Actors: Bleeding Edge Techniques Targeting Financial Services, will examine how nation-state attackers are evolving their tactics to infiltrate financial institutions and bypass enterprise security controls.