San Francisco, CA, USA
Sep 24, 2020   |  By Alex Powell
A critical vulnerability has been discovered in Windows Server, allowing unauthenticated attackers to compromise all Active Directory identity services. The severity of this exploit has been rated at a 10/10 by security experts. The U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA) believe that “active exploitation of this vulnerability is occurring in the wild”.
Sep 23, 2020   |  By Liarna La Porta
One week after iOS 14 was rolled out, we noticed a significant lag in uptake by devices used for work. Data from Mixpanel shows iOS 14 adoption since its release. We plotted Mixpanel’s data against that of our own which represents mobile devices that are, in one way or another, used for work.
Sep 17, 2020   |  By Alex Powell
Here are the top statistics to help you build your Zero Trust Network Access (ZTNA) business case.
Sep 16, 2020   |  By Liarna La Porta
Today Apple releases its next operating system update with iOS 14 and we’re excited to see data privacy is a central tenet. Apple has been positioning privacy and security on the iPhone as a unique selling point for some time now. At WWDC (and in recent ads), Apple pushed the message that “privacy is a fundamental human right,” and revealed new iPhone features that lend more control to the user when it comes to how their data is shared and accessed.
Aug 26, 2020   |  By Liarna La Porta
Chinese ad network, Mintegral, has made headlines this week for allegedly spying on user activity and committing ad fraud. The Mintegral SDK for iOS is said to contain malicious code designed to monitor user activity in order to facilitate ad fraud, and apparently this has been going on for over a year. Like other third-party advertising SDKs, the Mintegral SDK is a tool that helps developers monetize their apps via advertising.
Aug 21, 2020   |  By Robin Gray
On 11 August, the National Institute of Standards and Technology (NIST) released a 50-page guidance document on Zero Trust Architecture (ZTA), specifically with the enterprise in mind. It is not intended to be a single deployment plan for ZTA as every enterprise will have unique use cases and assets that need protection. We’ve poured over the guidance to provide a TL;DR, you can read the full publication here.
Aug 13, 2020   |  By Robin Gray
Every company is undergoing its own digital transformation project, but there is a clear gap between the public and private sectors; analyst research suggests that governments have a low to moderate maturity when it comes to digital. Gartner highlights that due to inflexible business models that aren’t easy to disrupt, government agencies struggle with digital transformation.
Aug 7, 2020   |  By Liarna La Porta
Social media app TikTok continues to stir controversy because of its ties to China. While the company appointed an American CEO in an effort to rebuild the trust of the US, that doesn’t change the fact that TikTok is owned by Beijing-based company ByteDance. US Administration officials have been looking at the national security risk specifically as it relates to the gathering of information on American citizens by a foreign adversary.
Aug 4, 2020   |  By Liarna La Porta
At Wandera, each day we receive requests from our enterprise customers wondering if a particular app is safe to allow on employee devices. Wandera’s app risk assessments consist of two main types of app analysis: When it comes to app risk assessments, there are a large number of risk indicators we consider. In our routine risk assessments we include the following.
Aug 3, 2020   |  By Liarna La Porta
On July 16, Twitter fell victim to a targeted social engineering attack that led to the compromise of 130 Twitter accounts, including Bill Gates, Joe Biden, and Elon Musk. Through a successful spear phishing attempt, a group led by 17-year-old “mastermind” Graham Ivan Clark was able to Tweet from these accounts, asking for Bitcoin donations that reportedly netted the scammers more than $180,000 in the short time the posts were live.
Sep 17, 2020   |  By Wandera
It's time to replace legacy VPNs.
Aug 5, 2020   |  By Wandera
Enable simple, secure and fast Zero Trust Network Access to any type of corporate resource.
Jun 8, 2020   |  By Wandera
An extension to the Wandera Security Suite for trusted access to cloud resources.
Apr 27, 2020   |  By Wandera
Michael Covington covers key priorities for IT pros to focus on to enable a safe and productive remote work environment.
Apr 3, 2020   |  By Wandera
Not all apps are created equal. Michael Covington shares tips to make sure you're downloading safe apps and not giving out unnecessary permissions.
Mar 27, 2020   |  By Wandera
Wandera's Michael Covington breaks down scenarios where VPNs are a help or a hindrance for remote working.
Mar 23, 2020   |  By Wandera
As millions adjust to remote working, we wanted to share insights to help you keep yourself, your colleagues and your information secure. Here's Michael J. Covington, with tips on how to avoid scams related to the Coronavirus itself.
Feb 19, 2020   |  By Wandera
Wandera’s threat research team has discovered a number of document management apps that fail to use encryption when transferring files between the user and the backend service.
Feb 4, 2020   |  By Wandera
Mobile threats continue to advance, putting corporate data at substantial risk.
Sep 5, 2020   |  By Wandera
Mobile phishing is now the number one threat affecting organizations worldwide. This whitepaper will look at the evolution of mobile phishing - examining why and how people get phished. It will explore the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.
Sep 5, 2020   |  By Wandera
Everybody has a part to play in keeping sensitive information safe from hackers. If you're looking for ways to increase cybersecurity awareness within your organization, we have something you can share.
Sep 1, 2020   |  By Wandera
Mobile security is a relatively new area of enterprise IT and many businesses are looking for a proven formula for securing not just the devices, but also the apps installed on them and the data they access.
Sep 1, 2020   |  By Wandera
People tend to favor Wi-Fi over cellular for obvious reasons - it's usually faster, it doesn't tax your data plan and it's widely available. However, there are a number of inherent risks in allowing your devices to connect to Wi-Fi networks. Wi-Fi networks expose mobile devices to malicious threats, such as man-in-the-middle attacks and sensitive data loss on public hotspots. This report is designed to inform you of the many and varied risks of Wi-Fi and practical steps on how to manage that risk.

Unified real-time security for your remote users, wherever they are and however they connect.

The way enterprises work has changed. Data is stored beyond corporate walls, and a more mobile workforce is working remotely. The perimeter has been redefined. This evolving environment requires a new security model that is mobile and cloud-centric.

Wandera provides a unified cloud security solution to protect this new way of working. We secure enterprise data against cyber threats, apply policies to filter internet access, and enable zero-trust access to applications. We believe in making security simple. This is why we created a unified offering, managed through a single console and supported by the broadest range of ecosystem integrations.

Unified cloud security for your enterprise:

  • In-network protection: Real-time security in the network, blocking zero-day threats at source. Our cloud based SDP creates secure isolated connections for each application. Fast and resilient tunnelling and encryption protocols deliver enterprise grade security.
  • Threat intelligence: Informed by 425 million sensors across our global network, the MI:RIAM threat intelligence engine always stays ahead of the evolving threat landscape.
  • Global network: Our high performance cloud platform scales vertically and horizontally on demand to deliver real-time security across 30+ global locations.
  • Deployment options: Mix and match our endpoint application with a variety of flexible network security options, including our Software Defined Perimeter, to suit your enterprise security needs.
  • Unified policy: Each step of the policy execution flow has been reimagined. Configure once, apply anywhere. Real-time analytics for complete visibility.
  • Ecosystem integrations: Make the most of your security investments and leverage our pre-built integrations to the largest ecosystem of UEM, IAM and SIEM technologies.

Zero Trust. No Hardware. All Cloud.