Security Experts:

long dotted


Elastic (NYSE: ESTC), the publicly traded company behind Elasticsearch and the Elastic Stack, has agreed to acquire endpoint security firm Endgame in a $234 million deal. [Read More]
Endpoint security firm SentinelOne has raised $120 million through a Series D funding round led by Insight Partners. [Read More]
Hackers can use synthetic clicks to bypass many of the privacy and security features implemented by Apple in macOS. The vulnerability is currently unpatched. [Read More]
Google announced a new policy that aims at eliminating the use of deceptive installation tactics among Chrome browser extensions. [Read More]
A security researcher claims it is possible to easily bypass macOS' Gatekeeper in order to execute untrusted code without any warning or user's explicit permission. [Read More]
Sophisticated "HiddenWasp" malware is targeting Linux and providing attackers with remote control of the infected systems, security researchers say. [Read More]
FireEye has acquired Verodin, a provider of tools that help test the effectiveness of cyber security controls, in a deal valued at roughly $250 million in cash and stock. [Read More]
Microsoft’s unified endpoint security solution is now publicly available for Mac users, following two months of limited preview. [Read More]
Microsoft has made the Windows Defender Application Guard extensions generally available, which now provides hardware-based isolation to all Chrome and Firefox users on Windows 10. [Read More]
Autonomous threat hunting company Hunters.AI emerges from stealth mode with $5.4 million in seed funding. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.