Tag "Endpoint Security"

Back to homepage

Poor patching, user education leave healthcare providers sitting ducks for cyber attacks

Despite the masses of highly sensitive data that healthcare companies manage, new analysis has warned that chronically poor endpoint security, weak patching practices and high exposure to social engineering make

Industry Insights

Enterprises spend more than $16 million on hidden costs of detection

Most organizations employ some kind of detection-based security to protect their systems. But a new report by cyber security company Bromium reveals that this approach has major hidden costs.Upfront licensing


Why Endpoint Management Is Critical to Security Strategy

Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Click here to view original


The Rewards & Cyber Risks of Internet of Things Devices

If credit unions use Internet of Things technology to better understand and serve their accountholders they must also understand the associated cybersecurity risks and new vulnerabilities – and protect member

Identity Theft

Data breaches at an all time high: How are businesses protecting themselves?

Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in cloud, big data, IoT, container,


6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.Defined


Escape future ransomware attacks by leveraging the right technology

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to a report


Internet of Things security issues bleed into 2018

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the perfect target


Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.The global cybersecurity skills shortage won’t ease anytime soon. In fact, there’s ample evidence


Zero in on your zero-day vulnerabilities

A zero-day attack comes, by definition, out of the blue. You cannot predict its nature or assess how much damage it might cause, but you can take some basic steps