Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

ESET details Kobalos, a sophisticated multiplatform malware that has been observed targeting several high-performance computers and other types of organizations. [Read More]
The security firm wants to scale operations to better serve the middle market. [Read More]
NEWS ANALYSIS: Microsoft generated a whopping $10 billion in security-related revenues in just the last 12 months and is now positioned as an enterprise cybersecurity powerhouse. [Read More]
Law enforcement authorities in the U.S. and Europe have seized the dark web sites associated with the NetWalker ransomware operations and also charged a Canadian national in relation to the malware. [Read More]
Qualys researchers discover a major security hole in the well-known Sudo utility. [Read More]
ZDI announces Pwn2Own 2021, with a prize pool of $1.5 million, including $600,000 for hacking a Tesla and $200,000 for Zoom and Microsoft Teams exploits. [Read More]
Apple confirmed that malicious hackers are exploiting serious security flaws in its flagship iOS and iPad OS platforms. Details are scant. [Read More]
An attacker would simply need to trick victims into accessing a specially crafted website. [Read More]
Google warned about a “government-backed entity based in North Korea” targeting security researchers with social engineering attacks and drive-by browser exploits from booby-trapped websites. [Read More]
A new phishing campaign delivering fake Office 365 password expiration reports has managed to compromise tens of C-Suite email accounts, Trend Micro warns. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.
Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?