Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CrowdStrike's Endpoint Activity Monitoring (EAM) helps customers gain real-time insight into attacks and explore the rich Stateful Execution Inspection data collected by sensors.
Cylance has released CylancePROTECT, a new offering that takes a “mathematical and machine learning approach to stop the execution of malware on endpoint computers and mobile devices.”
AVAST Software has received a significant investment from CVC Capital Partners that valued `the software company at $1 billion.
A Ponemon study found that 75% of the respondents identified mobile devices such as smart phones as "the greatest risk of potential IT security risk within the IT environment."
Invincea, a provider of endpoint security solutions that leverage secure virtual containers to protect against advanced malware and other threats, today announced that it has raised $16 million in a Series C round of funding.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Quarri Technologies, a developer of secure Web browsing software, today launched its new Armored Browser, a multifunctional browser designed to protect enterprise’s endpoints from malware attacks.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Invincea announced the launch of Invincea FreeSpace for Small Business, an endpoint security solution targeted to the highly vulnerable yet underserved small business market.
PasswordBox, a maker of software solutions that help users keep track of passwords across computers and mobile devices, announced that it has raised $6 Million in a Series A funding round.

FEATURES, INSIGHTS // Desktop Security

rss icon

Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords