Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
Apple ships an out-of-band iOS update for older iPhones and iPads alongside a warning that a pair of WebKit security vulnerabilities may have been actively exploited. [Read More]
Following a major software supply chain compromise that exposed data for several major companies, CodeCov plans to kill off the Bash Uploader tool that was responsible for the breach. [Read More]
Security researchers at Group-IB believe that Chinese nation-state threat actor APT41 performed the cyberattack against aviation IT firm SITA [Read More]
After a major restructuring earlier this year, Akamai hands security leadership reins to 15-year cybersecurity veteran Dr Boaz Gelbord. [Read More]
Volkswagen Group of America discloses a data breach that exposed customer names, email and mailing addresses, and phone numbers, as well as details about purchased vehicles. [Read More]
Recorded Future launches an in-house initiative that sets aside $20 million to invest in seed-stage and Series A startups in the nascent threat-intelligence space. [Read More]
CrowdStrike warns that SonicWall patches released in 2019 do not properly address a vulnerability in the company’s Secure Remote Access (SRA) devices. [Read More]
Microsoft warns that attackers are simultaneously deploying TensorFlow pods on multiple Kubernetes clusters to mine cryptocurrency. [Read More]
The company plans to use the new infusion of cash to strengthen its automated endpoint management solution. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
Torsten George's picture
Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different.
Torsten George's picture
Understanding not just the tail end of the cyber-attack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today’s threats.
Tim Bandos's picture
While working from home or even while at work for that matter, follow these steps to avoid behaviors that may let the bad guy in.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.