Endpoint Protection
Endpoint Protection | News, how-tos, features, reviews, and videos
16 top endpoint protection platforms
Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.
15 signs you've been hacked—and how to fight back
Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.
3 XDR market challenges
XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.
Free security resources for work-from-home employees during the COVID-19 crisis
Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.
Whitelisting explained: How it works and where it fits in a security program
Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it...
4 ways employee home networks and smart devices change your threat model
Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.
10 things you should know about XDR
An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.
4 tips for protecting users from COVID-19-targeted attacks
Remote users in particular are vulnerable to coronavirus-themed phishing attempts, malicious domains, and repurposed malware. Protect them with these basic steps.
Is enterprise security broken?
Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.
Work from home, phase 2: What comes next for security?
Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.
Best antivirus software: 13 top tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.
3 ways COVID-19 is changing CISO priorities
The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.
RSA 2020: 7 trends and takeaways
Attendance down, costs up, and lots of tech talk
5 standout products from RSA 2020
2020 will be remembered as the year the human element finally came to security.
Next-generation endpoint security goes beyond the endpoint
AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?
Updated