Security Experts:

long dotted


Intel plans on releasing CPUs with built-in protections against Meltdown and Spectre attacks later this year [Read More]
Danish shipping giant Maersk revealed that it had to restore nearly 50,000 PCs and servers following the NotPetya attack [Read More]
A remote code execution vulnerability in the Electron framework has impacted popular desktop applications, including Slack, Skype, Signal, GitHub Desktop, Twitch,, and others. [Read More]
Dell, HP and others have removed BIOS updates that patch the Meltdown and Spectre vulnerabilities due to unstable code delivered by Intel [Read More]
A significant number of ICS and corporate systems may be exposed to remote attacks due to serious vulnerabilities in a protection and licensing software from Gemalto [Read More]
Acer, Asus, Dell, Fujitsu, HP, IBM, Lenovo and other device manufacturers start releasing BIOS updates to patch Meltdown and Spectre CPU vulnerabilities [Read More]
Cyber threat protection firm FireEye said on Friday that it has acquired privately held big data platform provider X15 Software in a deal valued at roughly $20 million. [Read More]
A security flaw in Intel's Advanced Management Technology (AMT) technology can be abused with less than a minute of physical access to the device to gain full remote acces. [Read More]
AMD will soon provide optional processor microcode updates designed to mitigate Spectre attacks. Meltdown does not impact the company's CPUs [Read More]
Endpoint protection firm Endgame has been awarded a $1 million contract by the U.S. Fleet Cyber Command for the acquisition of the Endgame Hunt Team Platform with 10,000 sensors, plus maintenance and support. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.