Endpoint Protection

Endpoint Protection news, information, and how-to advice

strip protector
apc supply

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

Apple iPhone 5S (1)

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

If a malicious app is published on the App Store once and then is removed, attackers can continue to infect devices with it through PC malware

closeup of female hand holding red marker checking off list

Make threat intelligence meaningful: A 4-point plan

Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps

microsoft windows 10 logo

Why Windows 10? Microsoft stresses security

The new Windows Defender Advanced Threat Protection feature adds more security cred to Microsoft's new OS

hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

cancelling an it project

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

alert detection prevent hacker hacking2

Hands-on review: Threat intelligence could turn the tide against cyber criminals

We look at security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks, and iSight Partners that leverage the relatively new concept of Threat Intelligence

hacker shirt

For discerning hackers, malware is so last year

Fraudsters rely on legitimate administrator tools instead of malware to successfully breach systems and steal data

virtual apps vm control photo touch finger screens windows

Tanium review: Endpoint security at the speed of now

Tanium Endpoint Platform draws on fast peer-to-peer communications to answer queries of managed clients within seconds

zero balloon

Keep these cyber thug holidays marked on your calendar

Learn these days when cyber thugs attack with even more cunning and fervor, and get ready to respond to related exploitations

security companies to watch

10 more security startups to watch

These startups focus on encryption, endpoint protection event analysis, and radio-frequency scanning

Cisco plans to buy security-as-a-service provider OpenDNS

OpenDNS provides Web filtering and malware protection services to 65 million users

anti virus

Antivirus doesn’t work. So why are you still using it?

Standalone antivirus can no longer stop the sophisticated barrage of key loggers, backdoors, rootkits, Trojan horses, worms, and spyware

Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

prison jail cells law penitentiary security

How to lose customers with excessive security

If your service or product security works like a prison, don't be surprised when users and customers go elsewhere

Apple security checks may still miss iWorm malware

New research says Gatekeeper and XProtect aren't entirely effective in protecting Mac OS X against iWorm malware

mobile security

Selective wipe: The secret to getting users to report lost mobile devices

Of course smartphones and tablets will contain personal data, so security policies need to protect it, too

Load More