Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A researcher has identified several Thunderbolt vulnerabilities, dubbed Thunderspy, that expose millions of laptops and desktop computers to evil maid attacks. [Read More]
Microsoft and Intel have been working together on a new approach to malware detection that involves deep learning and the representation of malware as images. [Read More]
An analysis conducted by FireEye’s Mandiat revealed that only 9% of attacks generated security alerts and 53% of successful intrusions went undetected. [Read More]
Kaspersky has teamed up with SecurityWeek for a three-day virtual event where researchers and other industry professionals will discuss malware, exploits, threat hunting, and other interesting topics. [Read More]
Sophos informed customers that hackers delivered malware to its XG firewalls by exploiting a zero-day vulnerability. [Read More]
A vulnerability impacting nearly all antivirus products out there could have been exploited to disable anti-malware protection or render the operating system unusable. [Read More]
A researcher was able to exfiltrate data from air-gapped computers using vibrations produced by controlling the rotation speed of internal fans. [Read More]
Microsoft’s Patch Tuesday updates for April 2020 address 113 vulnerabilities, including several Windows flaws that have been exploited in attacks for code execution and privilege escalation. [Read More]
Sophos this week announced that the source code of isolation tool Sandboxie is now publicly available. [Read More]
Dell launches SafeBIOS Events & Indicators of Attack, a utility designed to alert IT and security teams about BIOS configuration changes that could be part of a sophisticated attack. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.