Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CrowdStrike adds firmware attack detection capabilities to its Falcon endpoint security platform. [Read More]
Denver, Co-based managed detection and response (MDR) firm Red Canary has raised $34 million in growth equity funding. [Read More]
Microsoft announced a series of changes to the security baseline in Windows 10, including the removal of the password-expiration policy from the platform. [Read More]
Intel adds Hardware Shield security feature to its new 8th Gen Intel Core vPro mobile processors to protect devices against firmware attacks. [Read More]
Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]
The North Korea-linked Lazarus group has been leveraging PowerShell to target both Windows and macOS machines as part of an attack campaign that has been ongoing since at least November 2018, Kaspersky Lab reports. [Read More]
Over 1 million ASUS users were likely impacted after attackers managed to inject a backdoor in the ASUS Live Update utility, Kaspersky Lab reports. [Read More]
Microsoft announced the availability of its Microsoft 365 advanced endpoint security solution across platforms, courtesy of Mac support added to Microsoft Defender Advanced Threat Protection (ATP). [Read More]
Microsoft is extending the protection capabilities of Windows Defender Application Guard with the launch of browser extensions for Chrome and Firefox. [Read More]
BlackBerry Cylance, the company that resulted from BlackBerry’s acquisition of Cylance, unveils CylancePERSONA, an endpoint behavioral analytics solution. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.