Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Adobe Flash plugin is no longer active by default starting with Firefox 55, and users of the new version will be required to activate it for each website they visit. [Read More]
Microsoft patches 48 vulnerabilities, including a Windows Search flaw that has been actively exploited in attacks [Read More]
Windows Defender ATP can detect suspicious PowerShell activities, code injection, and malicious documents, including attacks where a process connects to a web server and starts dropping and launching an app, Microsoft says. [Read More]
CylancePROTECT Home Edition brings endpoint security to consumers and provides families with an enterprise-class, next generation security software built for home use. [Read More]
Researchers have shared details of an attack on an Amazon Echo that can compromise the device and listen to what users are saying to the device and much more. [Read More]
Microsoft announces Windows bug bounty program with payouts ranging between $500 and $250,000 [Read More]
Avast acquires Piriform, the creator of the popular cleaning and optimization tool CCleaner, for an undisclosed amount [Read More]
Cybersecurity firms Endgame And Corvil have integrated their products to give greater visibility and protection across the entire infrastructure. [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]
Dell introduces new version of Endpoint Security Suite Enterprise for air-gapped systems using Cylance technology [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.