Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
FireEye announces new solutions, capabilities, pricing and packaging models, and a partnership with Oracle [Read More]
At RSA Conference in San Francisco, Microsoft announced new tools and technologies aimed at protecting connected devices from security threats. [Read More]
CrowdStrike unveils new Falcon Endpoint Protection Complete solution and a threat analysis subscription module for the Falcon platform [Read More]
Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
Symantec is releasing its own targeted attack analytics (TAA) tool to existing Symantec Advanced Threat Protection (ATP) customers free of additional charge. [Read More]
Palo Alto Networks acquires Israel-based incident response firm Secdo. Financial terms not disclosed, but some reports say Palo Alto will pay $100 million [Read More]
Czech antivirus software maker Avast announced Thursday that it will float on the London stock market next month in the British capital's biggest ever technology IPO [Read More]
Endpoint security firm Carbon Black files for IPO, looking to raise $100 million. The company’s stock will be traded on Nasdaq under CBLK [Read More]
RSA announces intent to acquire Fortscale, whose behavioral analytics technology will be added to the RSA NetWitness Platform [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.