Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Windows Defender ATP in Windows 10 Creators Update can detect code injection techniques associated with these threats, such as process hollowing and atom bombing. [Read More]
Symantec announced that it has agreed to acquire Israeli cybersecurity start-up Fireglass for an undisclosed sum. [Read More]
In the wake of global malicious attacks such as WannaCry and NotPetya, Microsoft this week announced a new feature meant to keep users’ data safe from ransomware and other type of malware. [Read More]
Akamai launches new product designed to protect enterprises against malware, phishing and data exfiltration attempts by analyzing DNS requests [Read More]
Boston, MA-based Cybereason today announced a $100 million Series D investment from SoftBank Corp., bringing the total raised by the firm to $189 million since its inception in 2012. [Read More]
An analysis of 35,000 companies around the world showed that thousands of them have failed to update the software running on a majority of their computers [Read More]
Enterprise IoT security company Armis emerges from stealth mode with $17 million in funding [Read More]
Router and switch LEDs can be used to stealthily exfiltrate sensitive data from air-gapped computers, researchers demonstrate [Read More]
Endpoint security and systems management firm Tanium has raised another $100 million, bringing the total investment to $407 million [Read More]
WikiLeaks detailed Athena, a malware developed by the CIA with a U.S. offensive-driven cybersecurity firm. The tool works on all versions of Windows [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.