Tag "Endpoint Security"

Back to homepage
Industry Insights

Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital

Hardware/Network

Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

In December 2017, cyberattackers used TRITON/TRISIS malware to target safety instrumented system (SIS) controllers at a critical infrastructure organization. The malware was designed specifically to interact with the controllers, potentially

Hardware/Network

Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security

Hardware/Network

Endpoint Attacks Increase as Patching Slows

While it’s no surprise that organizations are being compromised, a new study released by Ponemon Institute found that the rate at which organizations are compromised is quite alarming. The study, 2018 State of

Hardware/Network

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Finding a needle in a haystack is hard, but it’s nothing compared to finding a single piece of hay in the haystack that was put there with malicious intentions.As Verisign

Hardware/Network

Endpoint Security: It’s Way More Complicated than You Think

The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition

Industry Insights

Even with internal focus, most companies utilize external resources for cybersecurity

A greater reliance on metrics to measure success combined with enhancing skills across security teams can help organizations boost their cybersecurity effectiveness, according to a new report from CompTIA. The use

Cloud

Cyber Security In The Cloud: Are You ‘Flying Blind’?

As revealed by a recent Bitglass study of 135,000 companies around the world, cloud adoption has reached an all-time high. 81% of organisations now use cloud apps – up from 59% in

Hardware/Network

Authentication Grows Up

Which forms of multi-factor authentication (MFA) are working, which are not, and where industry watchers think the market is headed. More people log into their devices and apps with smartphones

Hardware/Network

The Importance of Device Security in IoT Ecosystems

The proliferation of IoT devices within not only the consumer, but also the commercial management space, is now becoming astounding. While various IT tools exist for the management of endpoint