Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

AVGater vulnerability in some antiviruses allows hackers to escalate privileges on a system by abusing the ‘restore from quarantine’ feature [Read More]
Microsoft has published information on the required standards to have a Windows 10 device be considered highly secure. [Read More]
Avira launches SafeThings, a new solution designed to help ISPs and manufacturers build security into home routers [Read More]
Windows Defender Exploit Guard that ships with Windows 10 Fall Creators Update, systems running Microsoft’s Windows 10 operating system can fend off emerging threats, Microsoft says. [Read More]
Symantec announces new capabilities in Symantec Endpoint Protection (SEP) and claims it’s leapfrogging the competition [Read More]
Organizations are increasingly turning to machine learning for security solutions, according to a new study commissioned by Cylance [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
Endgame used Mitre’s ATT&CK Matrix to evaluate its endpoint detection and response product by emulating an APT3 attack [Read More]
Researchers claim Apple silently patched a macOS vulnerability that can be exploited to bypass quarantine and execute JavaScript code [Read More]
Unsigned apps can steal passwords from the macOS keychain, researcher warns. Issue affects several versions of OS, including High Sierra [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.