Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security firms have started assessing the impact of the CIA hacking tools exposed in the WikiLeaks Vault 7 leak [Read More]
Enterprise software maker 1E has launched Tachyon, a tool that gives IT operations instant actionable access into the furthest reaches of the entire IT estate (up to 1.5 million endpoints), regardless of distribution or operating system. [Read More]
NSS Labs issues response with a step-by-step refutation of CrowdStrike's accusations over public tests of its endpoint security platform. [Read More]
Google expands Safe Browsing on macOS to protect Chrome users against ad injections and unauthorized settings changes [Read More]
Windows 10 Creators Update will provide users with improved control over software updates and privacy settings, Microsoft says. [Read More]
Google researchers find critical remote code execution vulnerability in ESET Endpoint Antivirus for macOS [Read More]
Netflix releases Stethoscope, an open source security tool that gives users recommendations for securing their devices [Read More]
Microsoft informed customers that the February patches will only be released on March 14 as part of the next planned Update Tuesday [Read More]
FireEye today unveiled major updates to its endpoint security platform, including two new protection engines and support for Apple’s macOS systems. [Read More]
On February 10, 2017, next-gen endpoint protection firm CrowdStrike filed suit against security product testing firm NSS Labs, and sought a temporary restraining order to prevent publication of CrowdStrike comparative test results. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.