@kolide

33 Followers
41 Following
116 Posts
Device security that completes your Zero Trust picture. Built for Okta, powered by Honest Security.
Websitehttps://www.kolide.com/
Bloghttps://www.kolide.com/blog
Linkedinhttps://www.linkedin.com/company/kolide-inc/
Youtubehttps://www.youtube.com/@kolidecybersecurity

Say hello to a brand new security solution — 1Password Extended Access Management. 🎉

Hybrid work, personal devices, and unmanaged apps that help employees boost their productivity have forever changed the way we work. So, the way we protect that work should change, too!

1Password Extended Access Management is the first product that secures every sign-in to every application from every device, even your employees’ personal apps and computers that they use for business. https://bit.ly/4dkmwgV

Extended Access Management (XAM) | 1Password

1Password Extended Access Management (XAM) secures all applications, on any device, and across any network, whether IT-managed or not. Empower your teams with the tools they need while maintaining the visibility and access controls necessary to secure your organization.

Every year the Verizon Data Breach Incident Report (DBIR) says the same thing: compromised credentials are a top cause of data breaches.

In other words, most breaches last year could have been prevented.

Tools to prevent some of the breaches already exist, and an enterprise password manager should be an obvious choice.

For our summary of the Verizon report, and our advice on how to secure your data, read our blog here: https://bit.ly/4bioqgm

Verizon's 2024 data breach report challenges the security industry to do better | 1Password

The Verizon 2024 Data Breach Investigations Report finds that, even during a period of technological transformation, security is still dealing with the usual suspects of credential-based attacks and human error. But there’s another story hiding underneath the data.

1Password Blog
Cisco Duo's Multifactor Authentication Service Breached

A third-party telephony service provider for Cisco Duo falls prey to social engineering, and the company advises customer vigilance against subsequent phishing attacks.

😬Oof–this story’s a useful reminder that MFA alone won’t keep your systems safe. Bad actors are out there putting the “phony” in “telephony.” 📵

(And if you want to know how secure different auth methods are, check out our write-up: https://t.ly/0co8n).

#cybersecurity #security #mfa #breach

2023's Least and Most Secure Authentication Methods

Passkeys, Dongles, or Biometrics? What's the right mix to build hacker-proof MFA?

Kolide

A lot of compliance guidelines have new vulnerability management requirements–and deadlines are coming faster than you think.

https://www.kolide.com/blog/vulnerability-management-goes-much-deeper-than-patching

#cybersecurity #security #regulation #vulnerability

Vulnerability Management Goes Much Deeper Than Patching

Compliance guidelines are driving companies toward vulnerability management, but how can teams broaden their scope beyond the patchable problems?

Kolide

We have an exciting announcement. Drumroll please…

⭐It’s a webinar! ⭐

Stop scrolling away! We swear that this webinar is going to be worth logging in.

Steve Won and Jason Meller are going to be talking about Device Trust and the challenges it poses to teams–along with some teasers for the exciting developments 1Password has planned.

Mark your calendar: April 23 at 12pm ET. You’ll be glad you did. https://1password.com/webinars/mobile-device-management-is-not-enough?utm_medium=social&utm_source=Kolide&utm_campaign=device_trust_xsell&utm_content=Webinar

#infosec #devicetrust #webinar

Why Mobile Device Management (MDM) Isn’t Enough | 1Password | 1Password

Learn how 1Password is revolutionizing mobile device management for organizations, offering more than just login security. Gain insights into mobile device health, empower employees to safeguard their devices, and boost productivity. Explore the future of device trust and secure access management now.

US Health Dept warns hospitals of hackers targeting IT help desks

The U.S. Department of Health and Human Services (HHS) warns that hackers are now using social engineering tactics to target IT help desks across the Healthcare and Public Health (HPH) sector.

BleepingComputer

We can't help but think of the MGM hack we wrote about not too long ago. If teams want phishing-resistant authentication, we have some ideas… https://t.ly/ESoFS

#cybersecurity #health #security

What Everyone Got Wrong About the MGM Hack

The MGM hack showcased a new combination of social engineering and ransomware that's increasingly common and worryingly effective.

Kolide

Protecting privacy isn’t just the moral thing–it’s becoming more and more of a legal obligation. This recent proposal suggests more regulation on the horizon, and CPRA rules just went into effect and changed a LOT for business in California.

We wrote on that here, along with some advice for teams who want to do more: https://t.ly/0fN67

#Infosec #CPRA

CPRA Will Transform How Your Company Treats Employee Data

Getting compliant with California's new data privacy law will take IT just as much as HR.

Kolide

Taking out the trash is a hassle, okay?

Do you like the Adventures in IT comic? Get it from the Kolidescope newsletter as soon as you sign up! https://lp.kolide.co/kolidescope

#newsletter #cybersecurity #security

The Kolidescope Newsletter for Security & IT

Kolidescope delivers Security & IT the latest news, editorial, and comics to help make your week a little easier.