Endpoint Protection

Endpoint Protection news, information, and how-to advice

stepping stairs step up
Ransomware

endpoint protection 1

10 cutting-edge tools that take endpoint security to a new level

The 10 products tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats

goalie protection save 2

7 trends in advanced endpoint protection

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends

endpoint security tools 1

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus

hunting orange

Fight back! Learn to hunt threats with free tools

Learn to detect malicious behavior by analyzing DNS and autoruns data with free and open source tools

cyber security

Block malware, ransomware, and phishing with 5 layers

There's no silver bullet to keeping intruders and hackers out, but you can minimize the risk by combining approaches

150817 google marshmallow 06

Android gets patches for serious flaws in hardware drivers and mediaserver

Eight critical and 28 high-risk vulnerabilities were fixed in the June Android security update

authentication

5 trends shaking up multifactor authentication

One of the biggest surprises in MFA tools is that physical tokens are making a comeback, with encryption keys embedded in 'smart' hardware tokens

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

Apple iPhone 5S (1)

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

If a malicious app is published on the App Store once and then is removed, attackers can continue to infect devices with it through PC malware

closeup of female hand holding red marker checking off list

Make threat intelligence meaningful: A 4-point plan

Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps

microsoft windows 10 logo

Why Windows 10? Microsoft stresses security

The new Windows Defender Advanced Threat Protection feature adds more security cred to Microsoft's new OS

hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

cancelling an it project

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

alert detection prevent hacker hacking2

Hands-on review: Threat intelligence could turn the tide against cyber criminals

We look at security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks, and iSight Partners that leverage the relatively new concept of Threat Intelligence

hacker shirt

For discerning hackers, malware is so last year

Fraudsters rely on legitimate administrator tools instead of malware to successfully breach systems and steal data

Load More