Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Redmond warns that China-based nation state threat actors are taking advantage of a one-year-old law to “stockpile” zero-days for use in sustained malware attacks. [Read More]
Managed detection and response provider Binary Defense Systems this week announced it has raised $36 million in its first funding round. [Read More]
Apple has paid out a total of $20 million through its bug bounty program and it’s now providing more information on rewards. [Read More]
Remote attackers could exploit two Event Log vulnerabilities in Windows to crash the Event Log application and cause a DoS condition. [Read More]
Apple has patched more than 100 vulnerabilities with the release of its new macOS Ventura 13 operating system. [Read More]
CISA says Cisco and Gigabyte product vulnerabilities disclosed in 2018 and 2020 are being exploited in attacks. [Read More]
Apple confirms the active exploitation of CVE-2022-42827, warning in a barebones advisory that the flaw exposes iPhones and iPads to arbitrary code execution attacks. [Read More]
SafeBreach warns of a new PowerShell backdoor that pretends to be part of the Windows update process. [Read More]
Google has announced KataOS, a security-focused and open source operating system for embedded devices running Ambient ML applications. [Read More]
California startup Bolster banks early-stage venture capital funding to build a fraud prevention platform for businesses. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Marc Solomon's picture
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
Marc Solomon's picture
If you view XDR as a destination and not a solution, regardless of the path you take, you will need to understand the focus and core competencies of each vendor,
Marc Solomon's picture
Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion.
Torsten George's picture
Self-healing cybersecurity systems represent a major security and IT productivity advancement, allowing organizations to streamline the management and protection of today’s highly distributed infrastructures.