SECURITY
XAM
Ending security obstructionism with human-centric security
Traditional cybersecurity practices often work to obstruct users rather than help them. In this …
Continue readingTraditional cybersecurity practices often work to obstruct users rather than help them. In this …
Continue readingIn this article, we discuss how admins can programmatically access Spotlight using a utility called …
Continue readingIn this blog, we summarize the results of a fall 2022 survey of IT, helpdesk, and security …
Continue readingIn this article, we compare the various difficulties and costs associated with trying to build your …
Continue readingThis article explains how, with 1Password’s Device Trust solution, you can use osquery’s …
Continue readingI am excited to announce the immediate availability of Mobile Checks and mobile end-user …
Continue reading