Quantcast
Channel: Kolide Blog
Browsing all 207 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Tell If CrowdStrike Falcon Sensor Is Running

CrowdStrike is a data and breach security company, which runs many services for endpoint security through its Falcon platform. CrowdStrike is generally classified as an Endpoint Detection and Response...

View Article


Image may be NSFW.
Clik here to view.

Managed vs Personal Apple IDs in the Workplace: an IT Guide

Apple devices rely on an Apple ID (formerly iCloud) account in order for various services and integrations to function (e.g., Find My), as well as to link software licenses purchased via the App Store....

View Article


Image may be NSFW.
Clik here to view.

The Risks of End of Life Software and How to Address Them

The thing about nostalgia is that it conveniently omits all the past’s imperfections. Regardless of what car dads will tell you, older isn’t always better. American muscle cars are beloved for their...

View Article

Image may be NSFW.
Clik here to view.

Device Auth: Snooze and User Experience Improvements

Note: check snooze is only available for organizations using our Device Trust for Okta solutionIn this Changelog, we’re going over two updates to our UI that streamline authentication for end users. In...

View Article

Image may be NSFW.
Clik here to view.

Can BYOD Policies Be Compatible With Good Security?

When workers bring their own equipment on the job, it opens the door to all kinds of trouble–just ask the NFL.In 2006, the NFL instituted a rule change that allowed each team’s offense to use their own...

View Article


Image may be NSFW.
Clik here to view.

What Is Device Trust?

The first known security incident involving a compromised device occurred during the Bronze Age, in present-day Turkey. In that case, the Trojan guards were good men, not bad actors with malicious...

View Article

Image may be NSFW.
Clik here to view.

What's the Deal With Enterprise Browsers?

In 1968, Robert Probst, research director for office furniture company Herman Miller, released an office design called the “Action Office II.” It was the culmination of almost a decade studying the...

View Article

Image may be NSFW.
Clik here to view.

Personal VPNs Can Be Shady, but Should Companies Ban Them?

It sounds like a psychological experiment.Give an animal a treat whenever it wants, instantly, for performing a simple trick. Teach it to expect that, and it will likely become docile, happy to comply...

View Article


Image may be NSFW.
Clik here to view.

Healthcare Security Is a Nightmare: Here's Why

Do you suffer from nosocomephobia (having an intense fear of hospitals)? Maybe it’s because you have a fear of blood, disease, or fluorescent lighting, but there’s another risk to consider–your...

View Article


Image may be NSFW.
Clik here to view.

Device Auth: Introducing Notify Only Check Strategy

Note: Notify Only is a feature only available for organizations using our Device Trust for Okta solution.Blocking devices from authenticating can feel intimidating, whether you’re rolling out Kolide’s...

View Article

Image may be NSFW.
Clik here to view.

Our New CrowdStrike Falcon Check

CrowdStrike Falcon is the most widely used EDR solution globally, making it unsurprising that many of Kolide’s customers depend on it as their primary means of defense against sophisticated...

View Article

Image may be NSFW.
Clik here to view.

1Password Acquires Kolide

Today, I’m delighted to announce that Kolide is joining 1Password.Before I delve into why this is great news, let me answer some of your most immediate questions. First, Kolide’s product isn’t going...

View Article

Image may be NSFW.
Clik here to view.

Can VDI Secure BYOD?

In 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she called the “Blue Pill.” The name, of course, was in reference to the Matrix, because this attack made...

View Article


Image may be NSFW.
Clik here to view.

Big Changes to Our Mobile App

Note: Kolide Mobile is only available for organizations using our Device Trust for Okta solutionWe’re excited to reveal a major Kolide Mobile update. This update introduces management of your Kolide...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Management Goes Much Deeper Than Patching

In 2016, the Large Hadron Collider in Switzerland fell prey to a vicious and devastating attack. The bad actor exploited a vulnerability that researchers at CERN had never considered–small furry...

View Article


Image may be NSFW.
Clik here to view.

How MFA Is Falling Short

In baseball, it’s tempting to think that once you’re on a base, the hard part is over. But then, just when you think you’re safe (you are literally “safe”) the baseman hits you with the hidden ball...

View Article

Image may be NSFW.
Clik here to view.

Introducing 1Password® Extended Access Management With Kolide

It’s hard to believe Kolide has been part of 1Password for just three months, given the magnitude of what we are announcing today. I knew when we joined 1Password’s team that we shared a vision for the...

View Article


Image may be NSFW.
Clik here to view.

Introducing Easier Registration

Kolide Device Registration is the process by which Kolide associates a device with a person when they first attempt to access an application that is protected by Device Trust.Registration is a critical...

View Article

Image may be NSFW.
Clik here to view.

Two New Checks for the ChatGPT macOS App

With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and...

View Article

Image may be NSFW.
Clik here to view.

New Feature: Limit Repeat End-User Notifications

When Device Trust first launched, Kolide would always warn end-users about failing Checks on their device that, if left unchecked, could block the user. This warning would appear for each new sign-in...

View Article
Browsing all 207 articles
Browse latest View live