Do Android Flaws Have You Looking for Alternatives?

August 31st, 2015

Android security flaws have become more frequent in the news lately. At least one of them, Stagefright, has been quite severe. The worst part is now that these vulnerabilities have publicly disclosed, everyone including cybercriminals are aware of them. The details needed to compromise devices have been published by every level of media, from Black […]

By: - Independent Computer Security Analyst


Big news. Google patching millions of Android devices against Stagefright exploit

August 5th, 2015

If you needed any more convincing as to just how big a deal the recently discovered Stagefright vulnerability is on Android devices, just take a look at how Google and Samsung are responding.

By: - Independent Computer Security Analyst


Gaping hole in Android lets hackers break in with just your phone number!

July 27th, 2015

A researcher has found a serious Android vulnerability that requires no interaction at all by the user to hijack their device. In fact, the vulnerability could allow a hacker to infect your mobile phone, while you’re fast asleep.

By: - Technology Reporter


Why the MDM Rush?

June 16th, 2014

With mobile devices continuing to drive consumer and enterprise marketplace trends, there is no lack of Mobile Management Device (MDM) vendors to choose from—and one more just entered the market. Lumension just rolled out Lumension Endpoint Management and Security Suite with Mobile Device Management v8.0. What sets it apart from the scores of other vendors? […]

By: - Forensics and Security Expert


Past, Present and Future of Endpoint Security

January 21st, 2014

In the throes of holiday shopping season, 110 million Target customers woke to the news that cleverly placed malware had pilfered their credit- and debit card numbers, along with other sensitive data. We aren’t yet certain who was behind the massive attack on Target and, evidently other large retailers, or how the heist was orchestrated. But […]

By: - Technology Reporter


Is Mobile Shopping Safer This Holiday Season?

November 26th, 2013

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert. Consider just a couple of […]

By: - IT Security Expert

Avoiding the User Blame Game

October 10th, 2013

It might not be part of any formal forensics or incident response policy, but odds are at most organizations, whenever a malicious hacking attack hits the mark there’s one step rarely missed: blaming the user. Users do some boneheaded things sometimes so pointing the finger at them is easy. But the truth is if IT […]

By: - IT Security Expert

BYOD or BYOT (Bring Your Own Threat)…The Case for Mobile Devices as Endpoints

May 7th, 2013

Lumension recently conducted a survey of more than 1,600 IT professionals on Linkedin regarding their thoughts on BYOD and mobile security. You can check it out here. There is a lot of interesting information in this survey, with one of the main takeaways was for these respondents’ organizations, BYOD is really all about end-user satisfaction […]

By: - IT Security Expert

Global 2013 Trends in Data Protection Maturity

March 25th, 2013

Protecting sensitive information has become increasingly difficult the last few years – if you haven’t recognized this fact and modified your security approach recently, you’ve got issues. One reason for this is the explosion of mobile devices on our networks. While convenient for our users and a significant productivity booster for our business, this new […]

By: - Dir. Solutions Marketing

PSA for Evernote Users: Change Your Passwords

March 4th, 2013

Another day, another breach of a popular cloud-based service. This time it was Evernote, a wildly popular personal note taking app for tablets like iOS devices (iPhones, iPads and iPod Touches) and similar Android devices. The breach was apparently discovered on Thursday 02/28 and made public on Saturday (03/02) morning. Evernote is requiring all of […]

By: - Forensics and Security Expert


Are You Prepared for the Flood of Gifted Mobile Devices?

January 7th, 2013

It’s the Nightmare Before After Christmas Christmas 2012 may have been a geek’s dream but it will likely become the CIO’s nightmare. As reported by The Daily Mail, Christmas shoppers snapped up one tablet computer EVERY SECOND and retailers report sales up 1,000% over 2011. Tablets were one of the hottest Christmas gifts of 2012 […]

By: - Former Chairman and CEO, Lumension


Disheartening Disconnect Identified by 2013 State of Endpoint Risk Study

December 4th, 2012

I’m concerned about the results of our fourth annual State of the Endpoint study just completed by the Ponemon Institute. Over the years, IT pros have reported shrinking confidence in the security of their networks. While this year is no different, the number of IT security pros who responded no, they are not more confident […]

By: - Forensics and Security Expert


Where Did We Fall on 2012 Predictions?

September 19th, 2012

About this time last year, I wrote out my predictions for the good, bad and ugly of 2012. While pulling together what I think the 2013 IT security landscape will look like (which is the topic of my SecuritySCAPE 2012 presentation and subsequent blog posts here on Optimal Security), it’s always interesting to first look […]

By: - Forensics and Security Expert


Wipe Your iPhone Before Upgrading to iPhone 5

September 17th, 2012

In the rush to upgrade to a new phone, you are probably tempted to sell off your old phone. Personally, I wouldn’t. But, if you choose to sell it, on eBay or anywhere else, remember to first be thorough in wiping the data. If you don’t, you could be giving away your very valuable data […]

By: - Dir. Solutions Marketing

Smashing Smishing!

September 5th, 2012


A former colleague pointed me to this video by Mike Saylor, the VP of Technology at the Texas Credit Union League. ‘Smishing’ is a portmanteau of SMS (Short Message Service – so, cell phone text messaging) and phishing (attempting to acquire by subterfuge sensitive personal information such as userIDs, passwords, credit or debit card information, […]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us