Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

network security / network traffic scanning
spyware alert notification

security audit - risk assessment - network analysis

How to audit Microsoft Active Directory

Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.

An abstract network of nodes or endpoints.

What Microsoft Defender can tell you about your network

Microsoft Defender for Business alerts can show what's happening in your network. The better you understand your network, the faster you can triage alerts.

Linux security shield

Top Linux endpoint protection software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection.

wireless network - industrial internet of things edge [IoT] - edge computing

MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats

The latest version of the MITRE ATT&CK Framework addresses two of the most pressing threat-actor targets: mobile devices and industrial control systems.

An abstract network of nodes or endpoints.

Syxsense launches vulnerability monitoring and remediation solution

The new solution promises to address three key elements of endpoint security – vulnerabilities, patching and compliance.

Macbook keyboard closeup

Jamf beefs up enterprise security software for Mac

Network threat prevention, muscular analytics, and BYOD management are among new features offered in app suite.

Browsers version 100 bug

Akamai's new Hijacking Protector aims to block browser redirection

The Audience Hijacking Protector by Akamai is a cloud-based solution to help protect in-browser attacks including marketing fraud and other malicious redirections.

hand at keyboard with Windows logo

Why you should patch the latest critical Windows RPC vulnerability right now

CVE-2022-26809 can allow attackers to compromise networks without user intervention, making it the most dangerous vulnerability fixed by Microsoft's April 12 Patch Tuesday update.

API security alert / software development / application flow chart diagram

Qualys Multi-Vector EDR update prioritizes alert response

The latest version of the Qualys Multi-Vector EDR tool includes additional threat-hunting and risk mitigation capabilities, improving alert prioritization and reducing the time needed to respond to threats.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Best advice for responding to today's biggest cyber threats

Scary new threats don't necessarily require big changes to your security infrastructure. These simple actions can be more effective and less disruptive.

mobile security endpoint protection

ESET refreshes enterprise products, embraces XDR

Auto-update, brute-force protection, and Android web control are among new features in ESET Protect.

mobile security / threat detection / traffic analysis

Malware detections surge from "COVID Bounce"

A year after pandemic peak, malicious threats to businesses and consumers rose above pre-virus levels, especially for mobile devices.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Using Windows Defender Application Control to block malicious applications and drivers

WDAC allows security and IT admins to control which applications, drivers and certificates can run on Windows systems.

network security concept

SentinelOne to buy Attivo Networks for $617M, bringing ID-based security to XDR platform

Known as an endpoint protection vendor, SentinelOne is broadening its appeal by adding an identity-focused security layer to its Singularity XDR (extended detection and response) platform, in a $616.5 million deal.

lawsuit judge law court decision sued

Webroot files patent infringement claim against Trend Micro

The lawsuit accuses Trend Micro of using Webroot's patented malware detection, network security, and endpoint protection technologies without authorization.

microsoft new

Microsoft changes default settings to improve network security

Here's what IT and security admins for Microsoft networks need to know about recent changes to Office and Windows.

Windows 11 logo bloom

Managing security in hybrid Windows 11 and Windows 10 environments

The transition to Windows 11 from Windows 10 gives organizations the opportunity to review and optimize security tools, settings and policies.

fragile binary cyberattack risk vulnerable

How to defend Windows networks against destructive cyberattacks

Defending against attacks intended to destroy systems rather than steal or extort requires a different approach, as Russia's cyberattacks against Ukraine demonstrate.

Load More
You Might Also Like