Tag "Endpoint Security"

Back to homepage

Fileless Malware Prompts Evolution of Endpoint Defenses

Conventional network endpoint defense used to rely largely on the basic fact that computers primarily used files to communicate. Files were not only transmitted to and from other systems, but


Should you fear the Reaper?

Move over Mirai, there’s a new monstrous botnet in town. The newly-discovered botnet, dubbed “Reaper” or “IoTroop,” appears to be a more powerful strain of the Internet of Things (IoT)


Sharp rise in fileless attacks evading endpoint security

A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. 54 percent of respondents said


How to stop Emotet malware from infecting your computer

The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Click here to


Data Security: One type is not like the other, or is it?

Protecting corporate and customer data on all devices must be a top priority for businesses.Security threats to the enterprise today are pervasive. This is evidenced by the increasing prevalence and

Vendor News

Medigate announces $5.35M seed round to protect connected medical devices

Israeli startup Medigate today announced $5.35 million in seed funding for its mission to secure the use of the millions of connected medical devices on healthcare provider networks. Backing for

Identity Theft

Can you prevent the mega breach?

The threat landscape today is more complex and more dangerous than it has ever been. Where once hackers tended to operate individually, now organisations face much more sophisticated threats from

Industry Insights

Hunting Threats Before Threats Hunt Us

Remember file cabinets?  Most businesses have auctioned them off or sent them home with employees.  For many, paper is a thing of the past.  An expansive communication network has collapsed


Endpoint security needs ‘efficient efficacy

Enterprise organizations want new endpoint security tools that are better at preventing exploits and malware and streamline operations.As we ease into 2018, endpoint security technology is in play.Next-generation players such


Top threats impacting endpoint security decisions

  Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats impacting endpoint security, and the role