lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#endpointsecurity

1 post1 participant0 posts today
Marco Ciappelli🎙️✨:verified: :donor:<p>🎉More Big News! 🎈🎈🎈</p><p>Please join us in welcoming Beachhead Solutions as an official sponsor of ITSPmagazine.</p><p>Beachhead Solutions provides hashtag#cloud-managed device security that enables businesses to enforce hashtag#encryption, control data access remotely, and instantly prove regulatory compliance across all endpoints—PCs, Macs, servers, phones, tablets, and USBs.</p><p>🔗 Explore their brand page on ITSPmagazine:<br><a href="https://lnkd.in/gP2RfpCa" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/gP2RfpCa</span><span class="invisible"></span></a></p><p>📢 Help us spread the word—tag your team, your peers, your fellow defenders.</p><p>Visit Beachhead Solutions Website 👉 <a href="https://itspm.ag/beachhead-solutions-r49e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itspm.ag/beachhead-solutions-r</span><span class="invisible">49e</span></a></p><p>Welcome aboard, Beachhead Solutions! ✨ 👏 ✨ 👏 ✨ 👏</p><p>— Sean Martin, CISSP &amp; Marco Ciappelli<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a>,<a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a>,<a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpointsecurity</span></a> <a href="https://infosec.exchange/tags/managedsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>managedsecurity</span></a> <a href="https://infosec.exchange/tags/MSPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSPs</span></a></p>
Roxas<p><span>This is a genuine request for input from the community. <br><br>A member of upper-middle management for a midsized internet technology company recently explicitly stated that they didn't want to install the company's management agent on their device. "I think for leadership, that sort of thing should be optional" was the quote. <br><br>This person is intelligent and capable, and is otherwise someone I would respect as a fellow member of the same circles and business. <br><br>This is so against axioms that I hold almost self-evident, that I realized I don't even have good arguments. I can endlessly find corners of the internet where this would be akin to "Pi is exactly 3!" at a Mathematics convention, but is there ever generally a time or company's infrastructure configuration where simply ignoring or allowing to be optional endpoint security wouldn't just be blatantly stupid? <br><br>Besides being aghast and expressing sharp chastisement, how does someone go about even beginning to describe why this cavalier attitude is so abhorrent? <br><br>Is there some situation where it's actually a kosher methodology or mindset? <br><br>I think I might just be so thrown off guard by the concept that I just can't think of even an obvious answer to start with here. <br><br></span><a href="https://hactivedirectory.com/tags/secops" rel="nofollow noopener noreferrer" target="_blank">#secops</a><span> </span><a href="https://hactivedirectory.com/tags/security" rel="nofollow noopener noreferrer" target="_blank">#security</a><span> </span><a href="https://hactivedirectory.com/tags/operations" rel="nofollow noopener noreferrer" target="_blank">#operations</a><span> </span><a href="https://hactivedirectory.com/tags/bestpractice" rel="nofollow noopener noreferrer" target="_blank">#bestpractice</a><span> </span><a href="https://hactivedirectory.com/tags/bestpractices" rel="nofollow noopener noreferrer" target="_blank">#bestpractices</a><span> </span><a href="https://hactivedirectory.com/tags/infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a><span> </span><a href="https://hactivedirectory.com/tags/devops" rel="nofollow noopener noreferrer" target="_blank">#devops</a><span> </span><a href="https://hactivedirectory.com/tags/endpoint" rel="nofollow noopener noreferrer" target="_blank">#endpoint</a><span> </span><a href="https://hactivedirectory.com/tags/endpointsecurity" rel="nofollow noopener noreferrer" target="_blank">#endpointsecurity</a><span> </span><a href="https://hactivedirectory.com/tags/technology" rel="nofollow noopener noreferrer" target="_blank">#technology</a></p>