Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The patches released by Linux distributions for the GRUB2 vulnerability dubbed BootHole (CVE-2020-10713) are causing many systems to become unbootable. [Read More]
Companies affected by the BootHole vulnerability in the GRUB2 bootloader have started issuing advisories. [Read More]
CISA has instructed government agencies to immediately install the patch released by Microsoft for SIGRed, a critical wormable vulnerability affecting Windows DNS servers. [Read More]
Microsoft has unveiled Project Freta, a free service that allows users to find rootkits and other sophisticated malware in OS volatile memory snapshots. [Read More]
Driver vulnerabilities can facilitate attacks on ATMs, PoS systems and other devices, warns firmware security company Eclypsium. [Read More]
Tanium and Salesforce have come together in a strategic relationship to help solve one of today's most compelling and urgent problems: how does security manage a workforce that has migrated from in-house company desktops to remote personal devices. [Read More]
Microsoft announces the public preview availability of the Android version of its Defender Advanced Threat Protection (ATP) software and the general availability of the Linux variant. [Read More]
Microsoft this week announced that Safe Documents, a feature meant to boost the protection of Microsoft 365 users when opening unsafe documents, is generally available. [Read More]
Applying micro-segmentation to endpoints can help stop attackers from moving laterally within an organization after the initial breach. [Read More]
Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a UEFI scanner. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.