Endpoint Protection

Endpoint Protection news, information, and how-to advice

security lock code
submarine periscope 101722825

hiya primary

New call-blocking apps in iOS 10 can stop spammers and scammers

iOS 10 allows apps to provider Caller ID labels for incoming voice calls, and automatically block callers, too

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Comodo, Digital Guardian, and Forcepoint provide strong protection for sensitive data

stepping stairs step up

Review: Promisec goes the extra step to secure PCs

Endpoint Manager 4.12 goes beyond discovery and detection to automate corrective action

Ransomware

Antivirus merger: Avast offers $1.3 billion for AVG

The merger will give Avast control of 400 million network "endpoints" running the companies' software

endpoint protection 1

10 cutting-edge tools that take endpoint security to a new level

The 10 products tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats

goalie protection save 2

7 trends in advanced endpoint protection

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends

endpoint security tools 1

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus

hunting orange

Fight back! Learn to hunt threats with free tools

Learn to detect malicious behavior by analyzing DNS and autoruns data with free and open source tools

cyber security

Block malware, ransomware, and phishing with 5 layers

There's no silver bullet to keeping intruders and hackers out, but you can minimize the risk by combining approaches

150817 google marshmallow 06

Android gets patches for serious flaws in hardware drivers and mediaserver

Eight critical and 28 high-risk vulnerabilities were fixed in the June Android security update

authentication

5 trends shaking up multifactor authentication

One of the biggest surprises in MFA tools is that physical tokens are making a comeback, with encryption keys embedded in 'smart' hardware tokens

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

Apple iPhone 5S (1)

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

If a malicious app is published on the App Store once and then is removed, attackers can continue to infect devices with it through PC malware

closeup of female hand holding red marker checking off list

Make threat intelligence meaningful: A 4-point plan

Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps

microsoft windows 10 logo

Why Windows 10? Microsoft stresses security

The new Windows Defender Advanced Threat Protection feature adds more security cred to Microsoft's new OS

Load More