endpoint security
Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …
Endpoint security really can improve user experience
Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …
Surge in endpoints drives need for security
The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than …
Confusion about IT security leaves devices at risk
When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …
Endpoint security lags in spite of vulnerabilities
Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …
Attackers use Google Drive, Dropbox to breach companies
A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …
Qualys announces free global asset inventory service
At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on …
Security challenges emerging with the rise of the personal cloud
Personal cloud is growing in importance as it shapes how employees operate across their digital lives, according to Gartner. End-user computing (EUC) and digital workplace …
Fox-IT launches cyberthreat management platform
Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …
The portable secure desktop: tVolution Mini
At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart …
How IT pros protect and investigate their endpoints
More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. …
Former lottery infosec head accused of hacking computers to buy winning ticket
The former head of information security at the Multi-State Lottery Association (MUSL), who was arrested in January 2015, stands accused of having tampered with the computer …
Featured news
Resources
Don't miss
- Fake spam filter alerts are hitting inboxes
- “Patched” but still exposed: US federal agencies must remediate Cisco flaws (again)
- Rhadamanthys infostealer operation disrupted by law enforcement
- Healthcare security is broken because its systems can’t talk to each other
- Wanna bet? Scammers are playing the odds better than you are