Meltdown and Spectre: What You Need to Know to Secure Your End-User Computing Environment
Feb26

Meltdown and Spectre: What You Need to Know to Secure Your End-User Computing Environment

Co-Author: Adi Kunduri, Senior Product Marketing Manager, VMware EUC Although Meltdown and Spectre have been publicly disclosed since January, the two security vulnerabilities remain at the top of daily technology and digital security news feeds, for good reason: These can be used to exploit modern processors that power millions, maybe billions of devices. This means desktops, servers, and mobile devices are all subject to potential...

Read More
Securing the Digital Workspace & Putting #EmployeesFirst
Feb06

Securing the Digital Workspace & Putting #EmployeesFirst

As an employee at VMware, I use my own digital workspace for access to my apps and data every day. Our internal IT staff has deployed VMware Workspace ONE to help deliver a secure digital workspace to tens of thousands of my colleagues, giving each of us access to our apps and data according to our roles. My digital workspace enables me to open a web browser or my Workspace ONE app from any of my devices and have single sign-on (SSO)...

Read More
2017 Year in Review: Security Across End-User Computing
Dec29

2017 Year in Review: Security Across End-User Computing

In 2017, there certainly was no shortage of cybersecurity attacks that made news on a monthly, and sometimes even weekly, basis. Most IT or security operations personnel became familiar with the major cybersecurity breaches this year, including WannaCry, Equifax and Petya. As the consumerization of IT becomes more prevalent across more organizations, the risk of security breaches occurring increases. To help mitigate this risk,...

Read More
5 Tips for Securing Data Across Public Wi-Fi Networks
Dec18

5 Tips for Securing Data Across Public Wi-Fi Networks

Last week, Wandera, part of our VMware Mobile Security Alliance, published a report which included some fascinating statistics on WiFi usage and security across mobile devices, such as: In 2016, 60% of total mobile data was used on WiFi networks. The average number of WiFi connections the typical corporate device makes per day is 12. 4% of corporate mobile devices have come into contact with a man-in-the-middle attack in the past...

Read More
How KRACK Affects Your Mobile Workforce & What You Can Do About It
Nov02

How KRACK Affects Your Mobile Workforce & What You Can Do About It

A couple weeks ago, a serious security flaw in the WPA2 protocol, that can be exposed with Key Reinstallation Attacks (or KRACK for short), was introduced to the world. This was an interesting discovery because we’re used to seeing vulnerabilities typically show up in software, whereas this weakness was found in a protocol, and a widely-used one at that. WPA2 is common security protocol used to encrypt many of the Wi-Fi networks...

Read More