Building a coping mechanism for data breaches

Data breaches may be daily news, but they will always be a significant worry for business stakeholders. It is the IT team, however, that have to deal with the technical side of breaches. In most of the breaches, there is always an element of human failure. In addition, Endpoint protection is rarely perfect. Better perhaps to always […]

Endpoint security as a service will grow in 2018

In the past endpoint security translated to antivirus, so organizations purchased software from a leading vendor, installed the software on their PCs, and then tasked the IT operations staff with the day-to-day care and feeding of AV. Consequently, few organizations considered managed security services for endpoint security. This situation changed quite a bit over the […]

LockPoS Malware Sneaks onto Kernel via new Injection Technique

A sneaky new injection technique delivers LockPoS malware straight into the kernel, researchers report. This “silent” method bypasses traditional antivirus software. LockPoS is a type of point-of-sale (PoS) malware designed to snatch credit card data from the memory of computers connected to PoS card scanners. It reads the memory of processes running on the system […]

Why Network Visibility Is Critical to Removing Security Blind Spots

There’s an axiom used by security professionals that states: “You can’t secure what you can’t see.” This rather simplistic statement actually has many different meanings when it comes to securing a business because of the rapidly growing number of network blind spots that exist in today’s information technology infrastructure. Network visibility is being able to […]

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

A recent report from Grand View Research predicts that the cyber threat intelligence (CTI) market will reach $12.6 billion by 2025. This growth in demand isn’t surprising when you consider the ongoing success of so many high-profile and extremely damaging attacks. This climate of increasingly sophisticated breaches has moved many organizations — particularly, those that handle and […]

Let no endpoint go dark

The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost reputation. Most organizations know this, but still struggle to obtain visibility into and control over corporate endpoints, which are often distributed throughout the world. When a device goes dark – […]

Best security software, 2017: How cutting-edge products fare against the latest threats

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection against the newest wave of threats. […]

The best antivirus? Kaspersky leads in latest tests, but that’s only part of the story

The AV_TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Products that ranked highest in all three areas were Kaspersky Lab Endpoint Security 10.3 and Small Office Security 5, Symantec Endpoint Protection 14.0 and Endpoint Protection Cloud 22.9, and Trend Micro Office Scan 12. You […]

How Healthcare Orgs Can Implement Strong End-User Security

End-user security is a critical aspect to overall health data security, especially as more organizations are implementing technologies allowing employees to be mobile. Read HIMSS Privacy and Security Director Lee Kim JD list five key tips for healthcare organizations for improving their end-user security on Health IT Security.

Endpoint security needs ‘efficient efficacy’

Read why Jon Oltsik says that enterprises need better Endpoint security tools to protect them exploits and malware and streamline operations on CSO Online : As we ease into 2018, endpoint security technology is in play. Next-generation players such as Barkly, Cylance and SentinelOne offer products based on machine learning algorithms to block traditional and new types of […]