Tag "Endpoint Security"

Back to homepage
Hardware/Network

Think Data Security, Not Endpoint Security

A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud. INTEROP 2019 – LAS VEGAS – Endpoint security is a common

Software

5 cyber security trends for 2019

Promoted by Keypath education.  Cyber security is increasing in importance for members of the public and business owners alike. Discover five trends that you really need to know. Norton Security

Hardware/Network

UK To Introduce New Law For IoT Device Security

The UK government has announced plans to introduce new IoT security laws for manufacturers of connected devices. Launched by Digital Minister Margot James, the legislation (which is open for consultation)

Hardware/Network

One hundred percent of endpoint security tools eventually fail

Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the

Hardware/Network

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.In 2017, my colleague Doug Cahill conducted research on endpoint security. Back then, the research indicated that

Industry Insights

Worldwide spending on security solutions expected to continue growing

Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019, an increase of 9.4% over 2017. This pace of growth is expected to continue

Hardware/Network

IT managers can’t ignore endpoints because most cyberattacks start there

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint Security survey by Sophos. In

Industry Insights

5 Essential Cybersecurity Practices for Small Business Owners

We live in a time when major data breaches make news headlines on an almost daily basis. We know that Yahoo, for example, agreed to a $50 million settlement in

Software

Zero trust browsing: Protect your organization from its own users

To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, pop-ups warning of outdated software

Software

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.Companies spend a huge amount of time and billions