Security Experts:

long dotted


Intel CPUs are vulnerable to a new type of attack named Load Value Injection (LVI) and described as a reverse Meltdown-type attack, but Intel says users should not be too concerned. [Read More]
Seattle, WA-based network security firm WatchGuard Technologies announced that it has agreed to acquire Spain-based endpoint security firm Panda Security. [Read More]
Cybersecurity firm Checkpoint has created an encyclopedia of evasion techniques used by malware. [Read More]
Microsoft this week announced new features in its Edge browser to prevent the download of potentially unwanted applications (PUA). [Read More]
Microsoft this week announced the general availability of Microsoft Threat Protection, its integrated security solution aimed at offering protection across users, email, applications, and endpoints. [Read More]
Endpoint security firm SentinelOne has become a cybersecurity unicorn after raising $200 million in a Series E funding round. [Read More]
In an attempt to improve the security of its users, the Chrome browser will soon start blocking insecure downloads on HTTPS pages, Google announced. [Read More]
Many devices are likely still vulnerable to DMA attacks, despite the fact that hardware and software vendors have taken steps to prevent such attacks. [Read More]
Hackers likely abused a vulnerability in Trend Micro OfficeScan to gain access to Mitsubishi Electric’s network last year and steal corporate data. [Read More]
Peter Leav has been named chief executive officer of McAfee after Chris Young decided to step down. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.