Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Sophisticated "HiddenWasp" malware is targeting Linux and providing attackers with remote control of the infected systems, security researchers say. [Read More]
FireEye has acquired Verodin, a provider of tools that help test the effectiveness of cyber security controls, in a deal valued at roughly $250 million in cash and stock. [Read More]
Microsoft’s unified endpoint security solution is now publicly available for Mac users, following two months of limited preview. [Read More]
Microsoft has made the Windows Defender Application Guard extensions generally available, which now provides hardware-based isolation to all Chrome and Firefox users on Windows 10. [Read More]
Autonomous threat hunting company Hunters.AI emerges from stealth mode with $5.4 million in seed funding. [Read More]
Mozilla has released Firefox 67 to the stable channel with improved protection against tracking and with fingerprinting and crypto-mining protection capabilities. [Read More]
Microsoft has added live response capabilities in Microsoft Defender ATP to help security teams more easily investigate incidents on remote machines. [Read More]
As organizations migrate to Microsoft Office 365 and other cloud services, many fail to use proper configurations that ensure good security practices. [Read More]
New Intel CPU vulnerabilities known as MDS, ZombieLoad, Fallout and RIDL impact millions of devices. Affected vendors published advisories and blog posts with information for users. [Read More]
A high-profile hacking collective is offering for sale information allegedly stolen from three top anti-virus companies located in the United States. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.