Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

data breach predictions

5 data breach predictions for 2017

Stay ahead of emerging threats -- here are five key data breach trends you should anticipate in 2017

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

The company hopes to reverse BlackBerry's fall with new phones

gems baubles precious treasure jewels

Celebrate 2016’s mobile gems

Cool, useful innovations were few and far between last year, so these five mobile breakthroughs deserve extra credit

encryption security Android

Mobile banking trojans adopt ransomware features

Two Android trojans that steal financial information and login credentials now double as file-encrypting ransomware programs

primary intro

Review: Threat hunting turns the tables on attackers

Game changing products from Sqrrl, Endgame, and Infocyte track down hidden Advanced Persistent Threats (APTs)

abstract circuitry with padlock for security

Windows 10 Creators Update steps up your security response

Windows Defender Advanced Threat Protection will let you detect and remediate the breaches your first line of defenses can't stop

iot security

BlackBerry integrates its enterprise IoT and mobile security portfolio

Tools from BlackBerry, Good, WatchDox, AtHoc, and Encription will finally share the same back and front ends

security lock code

Flash Player remains target of choice for exploit kits

A recent report finds that six of the top 10 vulnerabilities target Flash Player as cybercriminals take advantage of irregular and slow patching schedules

tokyo apple japan

Researchers find a way bypass the iOS activation lock

The researchers crashed the lock screen by inserting long strings in the Wi-Fi configuration settings

Android statues

Remote management app exposes millions of Android users to hacking

Man-in-the-middle attackers could exploit an AirDroid flaw to execute malicious code on devices

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Some say the privacy climate has improved due to technology advances, but that could change with the new administration

submarine periscope 101722825

How to seek and destroy advanced persistent threats

A brief guide to discovering malicious persistence and other advanced attack techniques with Endgame

iot security

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company, but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line.

vulnerable

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade, or replace ASAP

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security devops and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

android security

Google offers $200K for top prize in new Android hack challenge

Researchers can submit entries for limited-time 'bug chain' contest from now until March 14, 2017

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Comodo, Digital Guardian, and Forcepoint provide strong protection for sensitive data

android logo robot nougat

Google outlines security features in Android 7.0 Nougat

Improvements include faster direct boot, streamlined software updates, and enhanced integration with corporate directories

iris scan security 138208300

Galaxy Note 7 catches the eye and more

The new Samsung phablet provides a full portfolio of security options that truly advance the Android cause for business

Load More
You Might Also Like