Endpoint Protection

Endpoint Protection and Security

Unified Endpoint Management

Enterprise endpoint protection failures will continue until accountability increases

To make better choices, we must help enterprise stakeholders understand the conflicts of interest among the cyber players that present or influence their choices.

Security Shield

CISOs should examine commercial SOAPA offerings in 2018

Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

crystal ball

A few cybersecurity predictions for 2018

Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.


Redefining perimeter network security: The future is a hybrid

As information pushes further into the cloud, the role of perimeter security is changing. It will become part of a multifaceted solution for network security.

ransomware hack

2018: The year of advanced threat prevention

In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.

cybersecurity ts

The cybersecurity skills shortage acts as a root cause for security events

New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.

Malware virus

Malwarebytes is tracking missed detections in traditional antivirus

Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren't cutting it. The company examined detection data from nearly 10 million endpoints, and...

managed security service providers

Endpoint security needs 'efficient efficacy'

Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.

abstract circuitry with padlock for security

The push toward comprehensive endpoint security suites

Traditional and next-generation vendors offer suites for endpoint protection, detection and response. But what’s needed, and will customers buy?

writing description sign document security

How enterprise organizations benefit from SOAPA

Security operations and analytics platform architecture could accelerate technology innovation, ease integration, and enhance the value of existing technologies.

padlock with circuitry lock in secure

What’s holding back enterprise security technology transformation?

Hype, confusion and technobabble hinder cybersecurity purchasing decisions and ongoing operations.

internet security privacy

Cybersecurity technology: Everything is transforming and in play

Changing requirements and constant innovations are making security technology options more confusing.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

firewall hole

Next generation firewalls to become last generation firewalls

While next-generation firewalls remain a critical component in a business’ security solution, hackers have moved to new attacks in order to evade them. Combining the newer attack vectors with artificial intelligence and machine...

knife lanyard knot untangle rope

Mimecast’s newly discovered email exploit isn’t a vulnerability, it’s a feature

Mimecast, a Boston-based email security firm, claims to have discovered a new email exploit. The exploit itself centers on the fact that an attacker who sends an HTML-based email linking to an external CSS file can "edit any text in...

pc antivirus

Free course: Windows virus and malware troubleshooting

Learn how to identify, block and remove malware from Windows PCs.

growth money time plants

Scaling cybersecurity: Staying protected in the midst of business growth

While the Targets and Home Depots of the world certainly don’t want their brand tarnished, we've seen first hand that they have the financial strength and brand loyalty to muster through a damaging breach. It is the midsize and...

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

cybersecurity shield and gear image

What is an enterprise-class cybersecurity vendor?

To be an enterprise-class cybersecurity vendor, it takes industry, business process and operations expertise. But they must also demonstrate “soft power” to the market.

Load More