Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers demonstrate how hackers could remotely brick servers at scale via firmware attacks that leverage the Baseboard Management Controller (BMC). [Read More]
Despite the current use and continuing interest in artificial intelligence (AI) and machine learning (ML) in cybersecurity, actual experience post-deployment is not so positive. [Read More]
Untangle has announced a partnership with Malwarebytes designed to extend the visibility of Command Center users into their endpoints. [Read More]
The Anti-Malware Testing Standards Organization (AMTSO) has been joined by a new network product testing standard (NetSecOPEN), and a new product testing approach (the MITRE ATT&CK matrix). [Read More]
Super Micro says it has conducted a thorough investigation following the recent Bloomberg report, but claims it has found “absolutely no evidence of malicious hardware” on its motherboards. [Read More]
Several critical infrastructure organizations in Russia have been targeted by hackers believed to be profit-driven cybercriminals rather than state-sponsored cyberspies. [Read More]
Organizations are getting better at detecting breaches on their own, but it still takes them a long time to do it, according to a new report from CrowdStrike. [Read More]
Symantec unveils Industrial Control System Protection (ICSP) Neural, a USB scanning station designed to protect industrial and IoT environments against USB-borne malware. [Read More]
MITRE's ATT&CK framework has been used to evaluate enterprise security products from Carbon Black, CrowdStrike, CounterTack, Endgame, Microsoft, RSA and SentinelOne against a simulated attack launched by APT3 [Read More]
Cylance adds AWS support to its CylancePROTECT endpoint security solution to help organizations secure cloud environments [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.