Small business urged to adopt digital safeguards for modern success

Read Andy Stonhouse’s article about why small and medium businesses should adopt digital safeguards for defence against cyber attacks on Greeley Tribune : Not so long ago, a small business could get by on a strictly do-it-yourself basis when handling its digital needs. You only needed to get your 13-year-old nephew to build your website, […]

4 Best Practices for Better Endpoint Backup in State and Local Government

Read Craig J. Mathias list four best practices for end-point protection and data security on State Tech Magazine : The risk of data loss can keep any IT manager up at night. Disappearing data can cause major expense and even serious damage to the credibility of a government agency and significantly affect the productivity of […]

Endpoint Security and the Internet of Things

Read  Brian Girardi’s article about endpoint security and the Internet of Things on CSO Online : In 2016, the Mirai Botnet hijacked over half a million DVRs and IP cameras, redirecting traffic from these endpoints to some of the internet’s largest brands and taking many services offline. To those in the security community, the attack […]

Chipotle Data Breach Investigation Shows Fraudsters Aimed at Endpoints

Just over a month after first disclosing a data breach, Chipotle Mexican Grill released the results of an internal investigation, which revealed malicious actors stole data from customers across the majority of its 2,250 restaurants in 47 states. Read how the Chipotle data breach investigation shows that fraudsters aimed at endpoints on Security Intelligence.

3 Tips for Updating an Endpoint Security Strategy

Read Kelly Sheridan list three tips for businesses to update their endpoint security strategy on Dark Reading : There is no one-size-fits-all approach to endpoint security, a space that has become inundated with products competing to solve a problem that has challenged businesses for years. The last three to four years have driven the emergence of new […]

Taking a Cognitive Approach to Unified Endpoint Management

Read why Wes Gyure and John Harrington Jr. say that companies should take a cognitive approach to unified Endpoint management on Security Intelligence : If you function like most IT organizations, you’ve spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out […]

Finding your ideal endpoint protection—next-gen or otherwise—to achieve prevention, detection and response.

Read Maxim Weinstein’s article about why every company needs its own ideal endpoint protection on SC Magazine : In my last post, I concluded that choosing the endpoint security solution that best fits your business is more important than debating whether a product is or isn’t “next-gen.” This time around, I’ll share some considerations for […]

Organizations Struggle to Protect Growing Number of Endpoints

A recent study conducted by Dimensional Research has revealed that most organizations don’t have a security strategy in place to protect the growing number of endpoints on their networks. According to the study, just 33% of the survey’s respondents admitted that such a security strategy was in place, while the rest either said they were in […]

Cybersecurity expert says ‘almost everything can be hacked’ and endpoint protection is not enough

The average consolidated total cost of a data breach grew from $3.8 million in 2015 to $4 million in 2016, according to the 11th Annual Cost of Data Breach Study from the Ponemon Institute and IBM. Read about the interview with Chris Sullivan, general manager for intelligence and analytics at Core Security, who says that endpoint […]

Advanced Malware Detection and Response Begins at the Endpoint

Read why David Bisson says that advanced malware detection and response begins at the Endpoint on Trip Wire : It’s no secret the security community is witnessing a boom in sophisticated techniques and attack campaigns. Some of the most advanced threats circulating in the wild today leverage polymorphic malware that changes its form based upon […]