Endpoint Protection

Endpoint Protection news, information, and how-to advice

check engine light
emergency response alarm critical

iot threats security

Microsoft’s novel approach to securing IoT

Project Sopris looks to create a set of secure layers that protect both hardware and their communications, and it can refresh a compromised device

stethoscope iphone public domain

Netflix Stethoscope gives users a BYOD security checkup

The IT-compiled web application provides users a personalized list of security recommendations for their own computers, smartphones, and tablets

gary hayslip san diego 1

How San Diego fights off 500,000 cyberattacks a day

What it takes to protect San Diego’s complex network of smart city and legacy technology

primary intro

Review: Threat hunting turns the tables on attackers

Game changing products from Sqrrl, Endgame, and Infocyte track down hidden Advanced Persistent Threats (APTs)

security lock code

Flash Player remains target of choice for exploit kits

A recent report finds that six of the top 10 vulnerabilities target Flash Player as cybercriminals take advantage of irregular and slow patching schedules

submarine periscope 101722825

How to seek and destroy advanced persistent threats

A brief guide to discovering malicious persistence and other advanced attack techniques with Endgame

hiya primary

New call-blocking apps in iOS 10 can stop spammers and scammers

iOS 10 allows apps to provider Caller ID labels for incoming voice calls, and automatically block callers, too

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Comodo, Digital Guardian, and Forcepoint provide strong protection for sensitive data

stepping stairs step up

Review: Promisec goes the extra step to secure PCs

Endpoint Manager 4.12 goes beyond discovery and detection to automate corrective action

Ransomware

Antivirus merger: Avast offers $1.3 billion for AVG

The merger will give Avast control of 400 million network "endpoints" running the companies' software

endpoint protection 1

10 cutting-edge tools that take endpoint security to a new level

The 10 products tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats

goalie protection save 2

7 trends in advanced endpoint protection

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends

endpoint security tools 1

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus

hunting orange

Fight back! Learn to hunt threats with free tools

Learn to detect malicious behavior by analyzing DNS and autoruns data with free and open source tools

cyber security

Block malware, ransomware, and phishing with 5 layers

There's no silver bullet to keeping intruders and hackers out, but you can minimize the risk by combining approaches

150817 google marshmallow 06

Android gets patches for serious flaws in hardware drivers and mediaserver

Eight critical and 28 high-risk vulnerabilities were fixed in the June Android security update

authentication

5 trends shaking up multifactor authentication

One of the biggest surprises in MFA tools is that physical tokens are making a comeback, with encryption keys embedded in 'smart' hardware tokens

Load More