Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Symantec unveils Industrial Control System Protection (ICSP) Neural, a USB scanning station designed to protect industrial and IoT environments against USB-borne malware. [Read More]
MITRE's ATT&CK framework has been used to evaluate enterprise security products from Carbon Black, CrowdStrike, CounterTack, Endgame, Microsoft, RSA and SentinelOne against a simulated attack launched by APT3 [Read More]
Cylance adds AWS support to its CylancePROTECT endpoint security solution to help organizations secure cloud environments [Read More]
Microsoft has unveiled several enhancements to its Windows Defender Advanced Threat Protection (ATP) product to improve its protection capabilities. [Read More]
BlackBerry has agreed to acquire next-generation endpoint security firm Cylance for US $1.4 billion in cash. [Read More]
Mozilla has added a new feature to Firefox to alert users when they visit a website that has been part of a data breach in the past. [Read More]
Microsoft releases guidance on enforcing software encryption in Windows after researchers break the full-disk encryption feature of popular SSDs [Read More]
Microsoft announces that Windows Defender can now run in a sandbox to further improve the application’s resistance against attacks [Read More]
Cybersecurity solutions provider Fortinet completes acquisition of insider threat detection and response company ZoneFox [Read More]
Super Micro tells customers and SEC that Bloomberg’s Chinese spy chips story is wrong [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...