Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Endpoint visibility technology vendor Fleet attracted $20 million in new funding at a valuation in the range of $100 million. [Read More]
Researchers at Microsoft find a way to exploit for a pair of privilege escalation flaws to plant a root backdoor on Linux systems. [Read More]
Synopsys is expanding its reach into the cybersecurity business with plans to shell out $330 million to acquire White Hat security. [Read More]
Enveil, an early-stage startup tackling the 'holy grail' of data encryption, has banked another $25 million in venture capital funding. [Read More]
German wind turbine giant Deutsche Windtechnik discloses disruptive ransomware compromise. [Read More]
Springtide Ventures leads a new $27 million investment in a startup providing web application client-side protection. [Read More]
CISA has added former DNC and Yahoo CISO Bob Lord to its stable of technical advisors. [Read More]
South American startup Strike Security has secured $5.4 million to fund an ambitious plan to disrupt the penetration testing and attack surface management business. [Read More]
Google and Mandiant separately warn that nation-state APT actors, ransomware gangs and private mercenary exploit firms are burning through zero-days at record pace. [Read More]
The investment will help the company hire new talent and accelerate product development and global expansion. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Marc Solomon's picture
If you view XDR as a destination and not a solution, regardless of the path you take, you will need to understand the focus and core competencies of each vendor,
Marc Solomon's picture
Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion.
Torsten George's picture
Self-healing cybersecurity systems represent a major security and IT productivity advancement, allowing organizations to streamline the management and protection of today’s highly distributed infrastructures.
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
Torsten George's picture
Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different.
Torsten George's picture
Understanding not just the tail end of the cyber-attack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today’s threats.
Tim Bandos's picture
While working from home or even while at work for that matter, follow these steps to avoid behaviors that may let the bad guy in.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.