Security Experts:

long dotted


Researchers find more than 130 malware samples exploiting the Meltdown and Spectre vulnerabilities, including malware for Windows, Linux, macOS and browsers [Read More]
AMD’s Zen 2 and future processors will include protections against exploits such as the recently disclosed Spectre, the company’s CEO said [Read More]
Tenable and Cylance reported significant revenue growth for 2017 - Tenable announced $189 million in revenue (50% growth) and Cylance $100 million (177% growth) [Read More]
An update delivered by Malwarebytes to home and enterprise users caused serious problems, including Web connection issues, high memory usage, and crashes [Read More]
Intel plans on releasing CPUs with built-in protections against Meltdown and Spectre attacks later this year [Read More]
Danish shipping giant Maersk revealed that it had to restore nearly 50,000 PCs and servers following the NotPetya attack [Read More]
A remote code execution vulnerability in the Electron framework has impacted popular desktop applications, including Slack, Skype, Signal, GitHub Desktop, Twitch,, and others. [Read More]
Dell, HP and others have removed BIOS updates that patch the Meltdown and Spectre vulnerabilities due to unstable code delivered by Intel [Read More]
A significant number of ICS and corporate systems may be exposed to remote attacks due to serious vulnerabilities in a protection and licensing software from Gemalto [Read More]
Acer, Asus, Dell, Fujitsu, HP, IBM, Lenovo and other device manufacturers start releasing BIOS updates to patch Meltdown and Spectre CPU vulnerabilities [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.