Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cybersecurity solutions provider Fortinet completes acquisition of insider threat detection and response company ZoneFox [Read More]
Super Micro tells customers and SEC that Bloomberg’s Chinese spy chips story is wrong [Read More]
London, UK-based Garrison Technologies has raised approximately $30 million in Series B funding. Garrison provides hardware-based web isolation that allows users free and unrestricted -- but secure -- access to the internet. [Read More]
Industry professionals comment on reports that China planted spy chips in Super Micro servers used by Amazon, Apple and many other organizations in the US [Read More]
Tanium has raised an additional $200 million through the sale of common stock, which raises the company’s pre-money valuation to $6.5 billion. [Read More]
Russian cyber-espionage group Fancy Bear (APT28) is the first threat actor to have used a Unified Extensible Firmware Interface (UEFI) rootkit in a malicious campaign, security researchers claim. [Read More]
NSS Labs claims that AMTSO has organized a conspiracy against the EPP product testing industry – and specifically NSS Labs – to prevent independent testing of EPP products. [Read More]
Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
Windows machines that haven’t been patched against the National Security Agency-linked EternalBlue exploit are stuck in an endless loop of infection, security experts say. [Read More]
New privacy features in Apple’s Safari browser seek to make it tougher for companies such as Facebook to track you. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.