Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

microsoft 365 channel attributes apps
access control / authentication / privileges / security / key

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

ipsecurity protocols network security vpn3

Log4j mitigation advice for Microsoft security and IT admins

The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.

Outdated, obsolete computer systems in need of updating display binary code.

Your Microsoft network is only as secure as your oldest server

It's time to inventory your network to identify systems to replace or migrate away from.

Microsoft Windows  >  Defending against attacks

Microsoft announces new security, privacy features at Ignite

Microsoft has consolidated some security tools under the Defender brand and added security and privacy features and products. Here's a look at what's new.

CSO  >  malware / virus / security threat / protective antivirus shield

How to prevent sideloading attacks in Windows and Office 365

A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.

security detection monitoring

Will XDR modernize the SOC?

Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives.

Microsoft Windows  >  Defending against attacks

Why small businesses should consider Microsoft Defender for Business

Defender for Business brings EDR and threat monitoring features found in more expensive Windows licenses to smaller organizations.

5G light trails

6 key points of the new CISA/NSA 5G cloud security guidance

The security guidance focuses on zero-trust concepts as the US agencies anticipate growth of 5G networks.

Antivirus / virus alert / warning / security threats / protection from attack

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

Smishing, an SMS phishing attack / Vishing, a voice phishing attack by phone

Stealthy Trojan that roots Android devices makes its way on app stores

The criminals behind the Trojan have placed fully functional utilities that carry malicious code on the Google Play store in a way that evades detection.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

browser security

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft's very bad year for security: A timeline

Microsoft has had a horrible 2021, with vulnerabilities impacting its biggest services.

A laptop displays binary code and the flag of China.

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

The attackers used the exploit to deploy a new remote shell Trojan called MysterySnail.

network security / network traffic scanning

AT&T launches managed XDR suite to provide endpoint-to-cloud security

AT&T is combining security tools including its threat intelligence and detection platform USM Anywhere with endpoint and network security services from partners to roll out a cloud-based, managed XDR platform for end-to-end detection...

network security / secure connections / integrated system of locks

Time to check software and security settings for Windows network vulnerabilities

October is Cybersecurity Awareness Month, and that's a good excuse to review what's running on your network to identify security risks.

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

Load More
You Might Also Like