Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

A digital hub marked with crossed wrench and screwdriver branches circuits through a system.
Android Security

Security threat   >   One endpoint on a network has been compromised.

XDR: Still confusing after all these years

It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.

A hand flicks on an update switch. [ software update / fix / patch ]

Why it's time to review your Microsoft patch management options

Microsoft does not appear to be updating Windows Software Update Services, but newer patch management options might be a better choice.

diversity south africa man holding smartphone mobile technology connected by peopleimages gettyimag

Espionage campaign loads VPN spyware on Android devices via social media

Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.

Two developers collaborate on a project as they review code on a display in their workspace.

Malwarebytes pairs new MDR, EDR for overwhelmed cybersecurity teams

Malwarebytes MDR (managed detection and response) works by pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense.

HTTPS prefix in a web browser's search/address field

Secure web browsers for the enterprise compared: How to pick the right one

These enterprise-grade, Chromium-based web browsers are designed for the security needs of the enterprise, not the consumer.

windows 11 logo bloom

What are the new Windows 11 22H2 security features?

The September Windows 11 update add protections against malicious applications and drivers, phishing, credential misuse, and more.

A frowning, anxious woman looks at her phone in shock and horror.

Cybersecurity startup launches mobile app to protect against phishing attacks

Israeli startup novoShield has released an iPhone app that protects users against malicious websites.

locked phone and virtual data [mobile security]

In-app browser security risks, and what to do about them

Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.

rules rulebook letters compliance regulation by alex ishchenko getty

Resolving conflicts between security best practices and compliance mandates

Sometimes the latest security best practices don't align with an organization's compliance templates. These are some of the areas where you might need an exception.

Tech Spotlight   >   The Future of Work [CSO]   >   Laptop user with virtual security overlay.

New Deep Instinct partner program targets MSSPs fighting ransomware

Deep Instinct's Stratosphere program is indirectly aimed at small and medium-size businesses, which are increasingly turning toward MSSPs (managed security service providers).

5g cellular tower

Top 5 security risks of Open RAN

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.

government cios without authority washington columns executives

The Secret Service’s missing text messages: Lessons for IT security

The drama in Washington shines a light on the challenges in securing mobile communications and the role that document destruction and retention policies play in organizational security.

email iot internet security

Perception Point launches managed security service to help eliminate web browser threats

Prevention-as-a-service vendor says its new managed security service lets users browse the web or access SaaS applications without exposing enterprise data to risk.

Mobile phone data privacy.

Mobile apps are a privacy nightmare. The Roe decision put them center stage.

Concerns about app data and location tracking put digital privacy rights in the cross hairs of abortion access debate

PC security

Concentric launches new data privacy and cybersecurity solution Eclipse

Private risk consultancy firm says its new solution is designed to protect individuals, families, and teams from digital risks as cybercrime continues to plague organizations across the globe.

network security / network traffic scanning

How to keep attackers from using PowerShell against you

New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

security audit - risk assessment - network analysis

How to audit Microsoft Active Directory

Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.

Load More
You Might Also Like