Remove Cloud Remove Device Management Remove Malware Remove Mobile
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

Some of the most common examples of shadow IT include productivity apps like Trello and Asana, cloud storage and file-sharing apps like Dropbox, Google Docs, and Microsoft OneDrive, and communication and messaging apps like Skype, Slack, WhatsApp, Zoom, Signal, and Telegram. To experiment with new technologies. To save time or money.

Malware 68
article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks. Cloud-Based Vulnerability Scanners: On-demand scanning and monitoring.

Tools 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The BYOD Problem

Cloud Musings

This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD). 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi.

Mobile 70
article thumbnail

RIP MDM 200X ? December 16th 2011 - A Screw's Loose

A Screw's Loose

Mobile Device Management (MDM) is dead and many hardly knew you. I truly never thought you would hang on this long but you really managed to stick it out. MDM, we hardly knew you but just think, before you left this world you actually made people start to think about your progeny Mobile Application Management (MAM).

Mobile 62
article thumbnail

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

Essentially he has built a Venn Diagram based around 3 concepts, Mobile Security, API Security, and Enterprise Security. He was kind enough to place things like MDM (Mobile Device Management) and MAM (Mobile Application Management) in the diagram for us. print Tagged as: Enterprise Mobility , MIM , Security.

article thumbnail

The CTO made me do it - A Screw's Loose

A Screw's Loose

It didn’t help that security realized that the new devices were around and they weren’t locked down blackberries. You started to get some help when MDM (Mobile Device Management) products started to appear and let you get at least some control over the devices that were appearing, but you were almost always coming from behind.

CTO 70
article thumbnail

MIM ? For The Win - A Screw's Loose

A Screw's Loose

A few months ago I wrote a blogpost about how MDM (Mobile Device Management) had died. It was a slow painful death, but it was justified as it brought forth MAM (Mobile Application Management) and would lead to MIM (Mobile Information Management). Going Mobile. MIM – For The Win.

Mobile 63