Tag "Endpoint Protection"

Back to homepage
Hardware/Network

Avoid Bad Security Buying Decisions

Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands and creates new and greater vulnerabilities, organizations know they need to enhance

Hardware/Network Software

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics. Judging by last

Hardware/Network

IT managers can’t ignore endpoints because most cyberattacks start there

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint Security survey by Sophos. In

Hardware/Network

Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security

Hardware/Network

How To Close Security Gaps With A Threat Intelligence Library

Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time, these technologies have increasingly relied upon threat intelligence to create

Hardware/Network

Endpoint Security: It’s Way More Complicated than You Think

The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition

Industry Insights

Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?

A recent report by Forrester spotlighted a growing trend in infosec point solution purchasing: the majority of respondents dealt with the challenge of point-tool sprawl. In fact, 60% of survey respondents said

Cloud Software

Cloudy With a Chance of Cryptojacking

A growing trend amongst cyber-criminals is cloudjacking: the act of stealing processing and storage from someone else’s cloud account.  Many are combining this practice with cryptojacking to further boost their

Software

Are security professionals moving fast enough?

Anthony O’Mara, from Malwarebytes, explains to Information Age why security professionals need to move much faster to beat cyber criminals. With the increase in threats the cybersecurity industry faces, alongside

Hardware/Network

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear. Venture capital investments in cybersecurity companies are aggressive these days, but