Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Chrome 68 now marks HTTP sites as “Not Secure" and warn users that HTTP provides no data security. [Read More]
Threat detection and response firm Cynet raises $13 million in a series B funding round, bringing the total raised by the company to date to $20 million [Read More]
The Quick Look mechanism on macOS, which allows users to check file contents without actually opening the files, may leak information on cached files, even if they reside on encrypted drives or if the files have been deleted. [Read More]
New VirusTotal Monitor service aims to help software developers and antivirus vendors reduce the number of false positive detections [Read More]
Endpoint security firm Cylance announced that ithas closed a $120 million funding round led by funds managed by Blackstone Tactical Opportunities and including other investors. [Read More]
Endpoint security firm CrowdStrike has secured more than $200 million through a Series E round of financing, valuing the company at more than $3 billion. [Read More]
A newly added “Endpoint Verification” feature in G Suite provides administrators with increased visibility into the computers that have access to corporate data. [Read More]
IBM adds two new features to its MaaS360 with Watson unified endpoint management (UEM) product: Business Dashboards for Apps and Policy Recommendation Engine [Read More]
Apple's iOS 12 and macOS Mojave are set to bring several new security improvements when they arrive this fall. [Read More]
Malwarebytes acquires Binisoft, the maker of the Windows Firewall Control tool, to enhance its endpoint protection platform [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.