Tag "Endpoint Security"

Back to homepage
Cloud

Cyber Security In The Cloud: Are You ‘Flying Blind’?

As revealed by a recent Bitglass study of 135,000 companies around the world, cloud adoption has reached an all-time high. 81% of organisations now use cloud apps – up from 59% in

Hardware/Network

Authentication Grows Up

Which forms of multi-factor authentication (MFA) are working, which are not, and where industry watchers think the market is headed. More people log into their devices and apps with smartphones

Hardware/Network

The Importance of Device Security in IoT Ecosystems

The proliferation of IoT devices within not only the consumer, but also the commercial management space, is now becoming astounding. While various IT tools exist for the management of endpoint

Hardware/Network

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future. Traditional firewalls track

Identity Theft

Making informed decisions: The importance of data driven security

When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and peruse comparative

Hardware/Network

Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing attack surfaces. Here’s

Hardware/Network

Why You Should Protect Your Business Network Above All Else

By Tiffany Rowe – Content Creator at Seek Visibility, Yes, your computers and servers are where your data is saved; yes, mobile and IoT devices sure are vulnerable; but your

Mobile

What Is EMM And How Can It Help With Mobile Security?

Enterprise Mobility Management (EMM) is the process of leveraging people and technology to secure sensitive data present on employee devices. EMM automates security configurations on devices so they’re ready for

Hardware/Network

Security concerns around the rapidly growing use of the Industrial Internet of Things

Organizations hold disparate and unrealistic views on protecting the Industrial Internet of Things (IIoT), in which endpoints are considered to be the most vulnerable aspects, despite confusion over what actually constitutes an

Hardware/Network

Endpoint Concerns Blight IIoT Security

Securing the endpoint is the biggest concern for respondents to a new SANS Institute paper on the Industrial Internet of Things (IIoT), with patching a persistent challenge. The 2018 SANS Industrial