Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft unveils Windows Defender System Guard runtime attestation, a new Windows platform security technology for all editions of Windows [Read More]
AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
FireEye announces new solutions, capabilities, pricing and packaging models, and a partnership with Oracle [Read More]
At RSA Conference in San Francisco, Microsoft announced new tools and technologies aimed at protecting connected devices from security threats. [Read More]
CrowdStrike unveils new Falcon Endpoint Protection Complete solution and a threat analysis subscription module for the Falcon platform [Read More]
Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
Symantec is releasing its own targeted attack analytics (TAA) tool to existing Symantec Advanced Threat Protection (ATP) customers free of additional charge. [Read More]
Palo Alto Networks acquires Israel-based incident response firm Secdo. Financial terms not disclosed, but some reports say Palo Alto will pay $100 million [Read More]
Czech antivirus software maker Avast announced Thursday that it will float on the London stock market next month in the British capital's biggest ever technology IPO [Read More]
Endpoint security firm Carbon Black files for IPO, looking to raise $100 million. The company’s stock will be traded on Nasdaq under CBLK [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.