![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTA3Mzc1OSwicHVyIjoiYmxvYl9pZCJ9fQ==--04d63cb9c45079dbfb7bfae82905b17297de4392/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOls4MDAsbnVsbF19LCJwdXIiOiJ2YXJpYXRpb24ifX0=--d6a525257d1b31ffdab307d12cab025e349cb429/cover.png)
Featured
Introducing 1Password® Extended Access Management With Kolide
Kolide is thrilled to unveil the 1Password® Extended Access Management (XAM),
a groundbreaking initiative set to transform identity and access management
with a human-centric, flexible approach that bridges the Access-Trust Gap.
Read More
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAzOTQ0NSwicHVyIjoiYmxvYl9pZCJ9fQ==--e10d235ab76c11930e2eedfcc653c15789d2ff82/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.png)
Changelog
Device Auth: Introducing Notify Only Check Strategy
February 8th, 2024
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAzODYxMiwicHVyIjoiYmxvYl9pZCJ9fQ==--348d2220e9bf99965b6bd0fdb6cfcf353e830ba6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
Healthcare Security Is a Nightmare: Here's Why
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAzMTY1OSwicHVyIjoiYmxvYl9pZCJ9fQ==--02dd30cd8c0223774f44f98d6736e236a2383c71/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
Personal VPNs Can Be Shady, but Should Companies Ban Them?
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAyNDE2NywicHVyIjoiYmxvYl9pZCJ9fQ==--9e970cf80e65e0d396f16feb4611a815e7869224/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
What's the Deal With Enterprise Browsers?
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAxODU2NCwicHVyIjoiYmxvYl9pZCJ9fQ==--dfd4acdc786053abcf9090aca4a80d559d891671/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
Can BYOD Policies Be Compatible With Good Security?
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6MTAwNjQxNCwicHVyIjoiYmxvYl9pZCJ9fQ==--000d82a4f828c2f3988fb728880ac49a88b9a0da/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.png)
Changelog
Device Auth: Snooze and User Experience Improvements
December 18th, 2023
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6OTk4MDI3LCJwdXIiOiJibG9iX2lkIn19--06d51382555a282a64e6f2802e31afaf5f8cffa5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
The Risks of End of Life Software and How to Address Them
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6OTk3NDM1LCJwdXIiOiJibG9iX2lkIn19--5df2b174cf3aa01ad8a72935b5569286d04fb563/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Deep Dives
Managed vs Personal Apple IDs in the Workplace: an IT Guide
![](https://www.kolide.com/rails/active_storage/representations/proxy/eyJfcmFpbHMiOnsiZGF0YSI6OTk0NTc2LCJwdXIiOiJibG9iX2lkIn19--646d51a0e77a905471678166659164b742dc8e6f/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJ3ZWJwIiwicmVzaXplX3RvX2xpbWl0IjpbMTI4OCxudWxsXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--8da8de947683d0bcd3104e5c10f735514f91a685/cover.jpg)
Tutorials
How to Tell If CrowdStrike Falcon Sensor Is Running