Mac Patch Management Is an Urgent, Unsolved Problem
Few ad campaigns have ever had such a long-lasting impact as the iconic “I’m a Mac/I’m a PC” commercials that ran in the mid-aughts. In those commercials, John Hodgman’s PC was the stuffy, corporate...
View ArticleThe Humans Behind Kolide: Chris Born
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at Kolide.Name:...
View ArticleAI Browser Extensions Are a Security Nightmare
“You stood on the shoulders of geniuses to accomplish something as fast as you could, and before you even knew what you had you patented it and packaged it and slapped it on a plastic lunchbox, and now...
View ArticleThe IT and Security Recap of WWDC 2023
WWDC23 is over, and as always, it gave us a grab-bag of news to pore over and debate. Unsurprisingly, most of the coverage of WWDC focused on the big reveals in the keynote address and state of the...
View ArticleDevice Auth: Snooze and Exemption Requests
Does this situation sound familiar?Kolide has alerted you that you need to install an OS update in the next few days. You know you need to do it, but you put it off, and then you put it off some more,...
View ArticleThe Humans Behind Kolide: Caitlin Cabrera
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at Kolide.What...
View ArticleMOVEit Hack: the Ransomware Attacks Explained
Jesse James, the notorious 19th century gang leader, was known for his bank robberies. But in 1873, he and his crew hit a train rolling through Iowa. They had word the train was carrying massive...
View ArticleThe Humans Behind Kolide: Blaed Johnston
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at Kolide.Name:...
View ArticleThe Humans Behind Kolide: Antigoni Sinanis
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at Kolide.Meet...
View ArticleThe Humans Behind Kolide: Kate Gasparrini
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at Kolide.Before...
View ArticleUnmanaged Devices Run Rampant in 47% of Companies
Tl;dr: Kolide’s Shadow IT report shows that 47% of companies allow employees to access their resources on unmanaged devices, authenticating via credentials alone.In 2023, corporate cybersecurity is at...
View ArticleWhat's Driving the Rising Cost of Cyber Liability Insurance?
When you tell people you’re writing a piece on cybersecurity insurance, they tend to make the cock-headed, scrunched-eyebrow expression of a confused puppy. Even when you interview cyber insurance...
View ArticleCan ChatGPT Save Programmers?
When I was in my twenties, I smiled a lot. I didn’t know this at first, but I smiled so much that people who spent enough time with me would inevitably mention it. It was usually a compliment....
View ArticleAll the Highlights From Oktane 2023
In 2023, there are two things that are guaranteed to grab headlines: Taylor Swift and AI. And for this year’s Oktane, that marketing playbook was on full display. While I’m ambivalent towards Swift’s...
View ArticleThe Humans Behind Kolide: Dan Rubin
The Humans Behind Kolide series features interview-style blog posts with the humans who build our product and make it work. Get a behind-the-scenes look at who we are and the culture at...
View ArticleFor Databricks, Zero Trust Means Putting End Users First
In October 2023, Databricks’ Director of Enterprise Security, Michael Tock, sat down for a conversation with Kolide’s CEO, Jason Meller. In this conversation–which took place at Oktane, Okta’s annual...
View ArticleHow Clio Practices Security With a Culture of Trust
In October 2023, Clio’s IT Systems Manager, Tim Fitzgerald, sat down for a conversation with Kolide’s CEO, Jason Meller. The two discussed why device trust was a priority for Clio’s rapidly growing...
View ArticleHow Audio Deepfakes Trick Employees (And Moms)
In 1989, Mel Blanc, the originator and primary performer of Bugs Bunny, passed away. This left Warner Brothers with a major casting problem. Mel’s performance was pretty distinctive, and finding...
View ArticleWatershed Thinks Big to Keep a Small Team Secure
At the October 2023 Oktane conference, Kolide’s CEO, Jason Meller, sat down for a conversation with Jesse Kriss, Head of Security at Watershed. In this conversation, Jason and Jesse discuss topics like...
View Article89% of Workers Use AI–Far Fewer Understand the Risks
In late November 2022, OpenAI released ChatGPT to the public and launched the AI revolution. A few days later, Kolide’s CEO took to our company’s Slack and urged us to try out this new “society...
View ArticleHow Commonlit Balances Student Security and Employee Privacy
CommonLit https://www.commonlit.org Industry Education Tech Founded 2014 Location Washington, D.C. Size 120 Employees CommonLit is a nonprofit education technology company whose mission is to “unlock...
View ArticleStreamlining Authentication: Actionable Notifications on Mobile
Note: Kolide Mobile is only available for organizations using our Device Trust for Okta solutionWe’re excited to announce a major update to the Kolide Mobile user experience! Our latest version (2.0.2)...
View ArticleWhat Everyone Got Wrong About the MGM Hack
It was a scene straight out of a casino heist movie, but without George Clooney’s suavity to soften the chaos. Various systems at MGM Casinos–ranging from slot machines, to hotel key cards, to...
View ArticleHow to Tell If CrowdStrike Falcon Sensor Is Running
CrowdStrike is a data and breach security company, which runs many services for endpoint security through its Falcon platform. CrowdStrike is generally classified as an Endpoint Detection and Response...
View ArticleManaged vs Personal Apple IDs in the Workplace: an IT Guide
Apple devices rely on an Apple ID (formerly iCloud) account in order for various services and integrations to function (e.g., Find My), as well as to link software licenses purchased via the App Store....
View ArticleThe Risks of End of Life Software and How to Address Them
The thing about nostalgia is that it conveniently omits all the past’s imperfections. Regardless of what car dads will tell you, older isn’t always better. American muscle cars are beloved for their...
View ArticleDevice Auth: Snooze and User Experience Improvements
Note: check snooze is only available for organizations using our Device Trust for Okta solutionIn this Changelog, we’re going over two updates to our UI that streamline authentication for end users. In...
View ArticleCan BYOD Policies Be Compatible With Good Security?
When workers bring their own equipment on the job, it opens the door to all kinds of trouble–just ask the NFL.In 2006, the NFL instituted a rule change that allowed each team’s offense to use their own...
View ArticleWhat Is Device Trust?
The first known security incident involving a compromised device occurred during the Bronze Age, in present-day Turkey. In that case, the Trojan guards were good men, not bad actors with malicious...
View ArticleWhat's the Deal With Enterprise Browsers?
In 1968, Robert Probst, research director for office furniture company Herman Miller, released an office design called the “Action Office II.” It was the culmination of almost a decade studying the...
View ArticlePersonal VPNs Can Be Shady, but Should Companies Ban Them?
It sounds like a psychological experiment.Give an animal a treat whenever it wants, instantly, for performing a simple trick. Teach it to expect that, and it will likely become docile, happy to comply...
View ArticleHealthcare Security Is a Nightmare: Here's Why
Do you suffer from nosocomephobia (having an intense fear of hospitals)? Maybe it’s because you have a fear of blood, disease, or fluorescent lighting, but there’s another risk to consider–your...
View ArticleDevice Auth: Introducing Notify Only Check Strategy
Note: Notify Only is a feature only available for organizations using our Device Trust for Okta solution.Blocking devices from authenticating can feel intimidating, whether you’re rolling out Kolide’s...
View ArticleOur New CrowdStrike Falcon Check
CrowdStrike Falcon is the most widely used EDR solution globally, making it unsurprising that many of Kolide’s customers depend on it as their primary means of defense against sophisticated...
View Article1Password Acquires Kolide
Today, I’m delighted to announce that Kolide is joining 1Password.Before I delve into why this is great news, let me answer some of your most immediate questions. First, Kolide’s product isn’t going...
View ArticleCan VDI Secure BYOD?
In 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she called the “Blue Pill.” The name, of course, was in reference to the Matrix, because this attack made...
View ArticleBig Changes to Our Mobile App
Note: Kolide Mobile is only available for organizations using our Device Trust for Okta solutionWe’re excited to reveal a major Kolide Mobile update. This update introduces management of your Kolide...
View ArticleVulnerability Management Goes Much Deeper Than Patching
In 2016, the Large Hadron Collider in Switzerland fell prey to a vicious and devastating attack. The bad actor exploited a vulnerability that researchers at CERN had never considered–small furry...
View ArticleHow MFA Is Falling Short
In baseball, it’s tempting to think that once you’re on a base, the hard part is over. But then, just when you think you’re safe (you are literally “safe”) the baseman hits you with the hidden ball...
View ArticleIntroducing 1Password® Extended Access Management With Kolide
It’s hard to believe Kolide has been part of 1Password for just three months, given the magnitude of what we are announcing today. I knew when we joined 1Password’s team that we shared a vision for the...
View ArticleIntroducing Easier Registration
Kolide Device Registration is the process by which Kolide associates a device with a person when they first attempt to access an application that is protected by Device Trust.Registration is a critical...
View ArticleTwo New Checks for the ChatGPT macOS App
With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and...
View ArticleNew Feature: Limit Repeat End-User Notifications
When Device Trust first launched, Kolide would always warn end-users about failing Checks on their device that, if left unchecked, could block the user. This warning would appear for each new sign-in...
View ArticleImprovements to Kolide Device Removal
Previously, when you removed a device from Kolide, if the agent was still installed on the device, it would immediately re-enroll. Not great.To solve this in our legacy product, we introduced the...
View ArticleImprovements to Rechecking After an OS Update
The most popular checks we have in our catalog are the ones that ensure the operating system has the latest security patches. Whether it’s macOS, Windows, or Linux, gently reminding users to install...
View ArticleNew: Preview Remediation Strategy Impact
You’ve got Kolide rolled out, you’ve got a few Checks running, and it’s finally time for the moment of truth, let’s set up blocking!There’s just one problem, how do I know what my users are in store...
View ArticleImprovement: Add Internal Notes for Requests
Users of Kolide Device Trust can submit two different types of requests to administrators: Device Registration requests and Issue Exemption requests. Administrators have the ability to approve and deny...
View ArticleImprovements to Rechecking After a Browser Update
tl;dr: Now, when you restart your browser after an update, Kolide will automatically recheck issues so you don’t have to click the button manually! Check out the video.One popular way to use Kolide is...
View ArticleBetter Together: New 1Password Checks
Happy BlackHat Everyone! Even though I’m writing this from the sweltering desert of Las Vegas, Nevada, I couldn’t feel any cooler than I do right now as I discuss some new Kolide Checks we’ve released...
View ArticleIntroducing Mobile Checks
I am excited to announce the immediate availability of Mobile Checks and Mobile end-user self-remediation for Kolide Device Trust customers.Here’s a quick demo.The ChecksAs part of this release, we are...
View Article