Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Bitdefender launches Bugcrowd-based public bug bounty program with rewards of up to $1,500 [Read More]
Lenovo settles FTC charges over the Superfish adware shipped with many of its laptops, but the company will not pay a fine [Read More]
Mozilla said it would completely remove trust in the digital certificates issued by Chinese certificate authority WoSign and its subsidiary StartCom starting with Firefox 58. [Read More]
Security researchers have discovered two vulnerabilities that impact the extension systems of major browsers, including Chrome, Firefox, Safari, and Opera. [Read More]
Thousands of IoT Devices are at increased risk after a list of IP addresses and credentials was published to the public. [Read More]
Vulnerabilities in PoS systems from SAP and other vendors allow hackers to steal payment card data and change prices [Read More]
More than 4.7 million users could be exposed to potentially malicious ads and credential theft after cybercriminals managed to hijack the developer accounts of several popular Chrome extensions. [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
Security researchers have discovered a flaw in the Windows Object Linking and Embedding interface that allows hackers access using Microsoft PowerPoint to install malware. [Read More]
There are 4.1 million Windows endpoints online that would accept communication via the Remote Desktop Protocol (RDP) in one way or another, a recent report reveals. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.