Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
Windows machines that haven’t been patched against the National Security Agency-linked EternalBlue exploit are stuck in an endless loop of infection, security experts say. [Read More]
New privacy features in Apple’s Safari browser seek to make it tougher for companies such as Facebook to track you. [Read More]
One year after the BlueBorne flaws were disclosed, more than 2 billion devices are still vulnerable to attacks, either because users have failed to install patches or because no fixes are available [Read More]
The firmware running on nearly all modern computers has flaws that can be exploited to obtain potentially sensitive data from the device’s memory by using the old cold boot attack method [Read More]
macOS applications distributed via Apple’s official App Store marketplace are collecting and exfiltrating sensitive user data, security researchers warn. [Read More]
CrowdStrike has added its Falcon MalQuery malware search engine to the Hybrid Analysis service [Read More]
Code of DexGuard, software designed to secure Android applications and software development kits (SDKs), was removed from GitHub after being illegally posted on the platform. [Read More]
ESET launches new enterprise security solutions, including EDR, forensic investigation, threat monitoring, sandbox and management tools [Read More]
What you need to know about the Foreshadow / L1TF vulnerabilities affecting Intel CPUs, including impact and affected vendor responses [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?