Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The botnet downloads and installs a Monero miner onto the compromised systems and is also capable of installing a rootkit and executing commands. [Read More]
The Linux Foundation has secured a $10 million investment to expand the operations of the Open Source Security Foundation (OpenSSF). [Read More]
Tech giants Intel and VMware joined the security patch parade this week, rolling out fixes for flaws that expose users to malicious hacker attacks. [Read More]
CrowdStrike made two major announcements at its own Fal.Con conference this week, launching a free Community Edition of Humio, and announcing CrowdStrike XDR. [Read More]
The Microsoft Patch Tuesday train for October rolled in with fixes for at least 71 Windows security defects and an urgent warning about a newly discovered zero-day cyberespionage campaign. [Read More]
Full video of panel discussion from SecurityWeek's 2021 CISO Forum on navigating software bill of materials (SBOM) and supply chain security transparency. [Read More]
Cybereason has partnered with Google Chronicle to provide data accumulation and has extended its MalOps analytics engine to examine the wider set of elements, such as email, SaaS solutions, and cloud. [Read More]
Weir Group says the attack forced it to isolate and shut down systems and that engineering applications were only partially restored. [Read More]
Redmond threat hunters technical details on UNC-0343, an Iran-linked apex actor using password spraying to break into Office 365 accounts since at least July 2021. [Read More]
Mondoo plans to use the new funding to accelerate development of its cloud-native platform to provide developers with automated risk assessments. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
Marc Solomon's picture
If you view XDR as a destination and not a solution, regardless of the path you take, you will need to understand the focus and core competencies of each vendor,
Marc Solomon's picture
Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion.
Torsten George's picture
Self-healing cybersecurity systems represent a major security and IT productivity advancement, allowing organizations to streamline the management and protection of today’s highly distributed infrastructures.
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.