Endpoint Protection

Endpoint Protection and Security

writing description sign document security

How enterprise organizations benefit from SOAPA

Security operations and analytics platform architecture could accelerate technology innovation, ease integration, and enhance the value of existing technologies.

padlock with circuitry lock in secure

What’s holding back enterprise security technology transformation?

Hype, confusion and technobabble hinder cybersecurity purchasing decisions and ongoing operations.

internet security privacy

Cybersecurity technology: Everything is transforming and in play

Changing requirements and constant innovations are making security technology options more confusing.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

firewall hole

Next generation firewalls to become last generation firewalls

While next-generation firewalls remain a critical component in a business’ security solution, hackers have moved to new attacks in order to evade them. Combining the newer attack vectors with artificial intelligence and machine...

knife lanyard knot untangle rope

Mimecast’s newly discovered email exploit isn’t a vulnerability, it’s a feature

Mimecast, a Boston-based email security firm, claims to have discovered a new email exploit. The exploit itself centers on the fact that an attacker who sends an HTML-based email linking to an external CSS file can "edit any text in...

pc antivirus

Free course: Windows virus and malware troubleshooting

Learn how to identify, block and remove malware from Windows PCs.

growth money time plants

Scaling cybersecurity: Staying protected in the midst of business growth

While the Targets and Home Depots of the world certainly don’t want their brand tarnished, we've seen first hand that they have the financial strength and brand loyalty to muster through a damaging breach. It is the midsize and...

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

cybersecurity shield and gear image

What is an enterprise-class cybersecurity vendor?

To be an enterprise-class cybersecurity vendor, it takes industry, business process and operations expertise. But they must also demonstrate “soft power” to the market.

wrestlers fighting

How Promisec keeps endpoints in compliance

The Promisec Endpoint Management (PEM) software can be installed completely on-premises and gives visibility, advice, and even remediation help for all kinds of threats, unwanted programs and compliance issues that crop up within...

pexels programming code

Here's why the scanners on VirusTotal flagged Hello World as harmful

Last week, on August 10, a security researcher who goes by the handle "zerosum0x0" posted an interesting image to Twitter, it was the code behind a debug build of an executable. The code was 'Hello World' – the training example used...

cybersecurity stock

Security pros choose their top enterprise-class cybersecurity vendors

Cisco, IBM, Symantec and McAfee lead the cybersecurity vendors in mind share, but the race has just begun.


Cylance blamed for DirectDefense’s ‘botnet’ disclosure

Twenty-four hours after Carbon Black responded to a report from DirectDefense that their Cb Response product was leaking customer information (it doesn't), one company executive is pointing the finger at Cylance as the source of the...


Pentest firm calls Carbon Black "world’s largest pay-for-play data exfiltration botnet"

On Wednesday, DirectDefense, Inc. disclosed that they've discovered hundreds of thousands of files from Carbon Black customers. The discovery is said to pose a significant risk to Carbon Black's clients, because of the company's...

artificial intelligence / machine learning

Moving forward with machine learning for cybersecurity

Cybersecurity professionals see potential in machine learning, but they need education and guidance.

hacked computer security symbol   hacked rot

12 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned.


Black Hat 2017: Insightful, but too much hype

Black Hat 2017 was a busy show, highlighting a healthy cybersecurity industry. But there was too much hype, misunderstanding, and proprietary agendas.

artificial intelligence / machine learning

Using AI to spot malware patterns

Traditional antivirus can't keep pace with today's threats. Here's how one start-up is using machine learning to fight a better fight.

What to expect at Black Hat: Security hype and reality

Look for machine learning, automation, orchestration, integration and threat intelligence to dominate the Black Hat security conference.

Load More