How to Tell If CrowdStrike Falcon Sensor Is Running
CrowdStrike is a data and breach security company, which runs many services for endpoint security through its Falcon platform. CrowdStrike is generally classified as an Endpoint Detection and Response...
View ArticleManaged vs Personal Apple IDs in the Workplace: an IT Guide
Apple devices rely on an Apple ID (formerly iCloud) account in order for various services and integrations to function (e.g., Find My), as well as to link software licenses purchased via the App Store....
View ArticleThe Risks of End of Life Software and How to Address Them
The thing about nostalgia is that it conveniently omits all the past’s imperfections. Regardless of what car dads will tell you, older isn’t always better. American muscle cars are beloved for their...
View ArticleDevice Auth: Snooze and User Experience Improvements
Note: check snooze is only available for organizations using our Device Trust for Okta solutionIn this Changelog, we’re going over two updates to our UI that streamline authentication for end users. In...
View ArticleCan BYOD Policies Be Compatible With Good Security?
When workers bring their own equipment on the job, it opens the door to all kinds of trouble–just ask the NFL.In 2006, the NFL instituted a rule change that allowed each team’s offense to use their own...
View ArticleWhat Is Device Trust?
The first known security incident involving a compromised device occurred during the Bronze Age, in present-day Turkey. In that case, the Trojan guards were good men, not bad actors with malicious...
View ArticleWhat's the Deal With Enterprise Browsers?
In 1968, Robert Probst, research director for office furniture company Herman Miller, released an office design called the “Action Office II.” It was the culmination of almost a decade studying the...
View ArticlePersonal VPNs Can Be Shady, but Should Companies Ban Them?
It sounds like a psychological experiment.Give an animal a treat whenever it wants, instantly, for performing a simple trick. Teach it to expect that, and it will likely become docile, happy to comply...
View ArticleHealthcare Security Is a Nightmare: Here's Why
Do you suffer from nosocomephobia (having an intense fear of hospitals)? Maybe it’s because you have a fear of blood, disease, or fluorescent lighting, but there’s another risk to consider–your...
View ArticleDevice Auth: Introducing Notify Only Check Strategy
Note: Notify Only is a feature only available for organizations using our Device Trust for Okta solution.Blocking devices from authenticating can feel intimidating, whether you’re rolling out Kolide’s...
View ArticleOur New CrowdStrike Falcon Check
CrowdStrike Falcon is the most widely used EDR solution globally, making it unsurprising that many of Kolide’s customers depend on it as their primary means of defense against sophisticated...
View Article1Password Acquires Kolide
Today, I’m delighted to announce that Kolide is joining 1Password.Before I delve into why this is great news, let me answer some of your most immediate questions. First, Kolide’s product isn’t going...
View ArticleCan VDI Secure BYOD?
In 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she called the “Blue Pill.” The name, of course, was in reference to the Matrix, because this attack made...
View ArticleBig Changes to Our Mobile App
Note: Kolide Mobile is only available for organizations using our Device Trust for Okta solutionWe’re excited to reveal a major Kolide Mobile update. This update introduces management of your Kolide...
View ArticleVulnerability Management Goes Much Deeper Than Patching
In 2016, the Large Hadron Collider in Switzerland fell prey to a vicious and devastating attack. The bad actor exploited a vulnerability that researchers at CERN had never considered–small furry...
View ArticleHow MFA Is Falling Short
In baseball, it’s tempting to think that once you’re on a base, the hard part is over. But then, just when you think you’re safe (you are literally “safe”) the baseman hits you with the hidden ball...
View ArticleIntroducing 1Password® Extended Access Management With Kolide
It’s hard to believe Kolide has been part of 1Password for just three months, given the magnitude of what we are announcing today. I knew when we joined 1Password’s team that we shared a vision for the...
View ArticleIntroducing Easier Registration
Kolide Device Registration is the process by which Kolide associates a device with a person when they first attempt to access an application that is protected by Device Trust.Registration is a critical...
View ArticleTwo New Checks for the ChatGPT macOS App
With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and...
View ArticleNew Feature: Limit Repeat End-User Notifications
When Device Trust first launched, Kolide would always warn end-users about failing Checks on their device that, if left unchecked, could block the user. This warning would appear for each new sign-in...
View Article