Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

An Exploit Prevention update released recently by McAfee for Endpoint Security is blocking Windows users from logging on to their systems, and some major organizations appear to be affected. [Read More]
Endpoint security firm enSilo announces $23 million in Series B funding, new capabilities for its platform, and significant revenue growth. [Read More]
Menlo Security, a provider of zero-trust internet isolation services, has raised $75 million in a Series D funding round led by clients advised by JP Morgan Asset Management. [Read More]
TrapX Security, a company providing cyber defense solutions that rely on deception technology, raises $18 million in a Series C funding round. [Read More]
Artificial intelligence (AI) and machine learning (ML) technology that was originally sold as the answer to cybercrime is now being questioned: is it a silver bullet or just a temporary advantage to the defenders? [Read More]
Google is making web browsing with Chrome safer with a new option for reporting suspicious websites and a new warning mechanism for sites that use deceptive URLs. [Read More]
The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert for the Windows vulnerability tracked as BlueKeep and CVE-2019-0708 after successfully exploiting it for remote code execution. [Read More]
Microsoft wants to make its Windows platform passwordless and the latest Windows 10 release marks one step closer to that goal. [Read More]
macOS 10.15 Catalina brings several security-related improvements, including an enhanced Gatekeeper, a dedicated read-only volume for the OS, data protections, and support for Activation Lock. [Read More]
Elastic (NYSE: ESTC), the publicly traded company behind Elasticsearch and the Elastic Stack, has agreed to acquire endpoint security firm Endgame in a $234 million deal. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.