endpoint security
How to wipe Superfish adware and offending cert from your Lenovo laptop
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
Browser vulnerabilities to become biggest endpoint challenge
A growing number of flaws in web browsers is viewed as the biggest endpoint security headache by today’s IT decision-makers, according to Malwarebytes. With the number …
Dynamic endpoint protection by McAfee and ForeScout
ForeScout Technologies and McAfee, part of Intel Security, have partnered to provide a new and enhanced interoperability between ForeScout CounterACT and McAfee solutions. The …
New BlackPOS variant masquerades as AV service
Before the Backoff point-of-sale malware received deserved attention, the main player in the PoS malware field was BlackPOS (or Kaptoxa), the memory-scraping malware that was …
Unified solution for dynamic mitigation of cyberattacks
At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …
Gemalto to acquire SafeNet
Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
Endpoint security myths and why they persist
In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles …
The impact of IoT on IT infrastructure
Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity …
Endpoint protection attitudes and opinions
Bromium surveyed more than 300 information security practitioners focused on endpoint threats and security. The overwhelming majority of information security professionals …
Featured news
Resources
Don't miss
- Digital sovereignty becomes a matter of resilience for Europe
- Storm-2603 spotted deploying ransomware on exploited SharePoint servers
- CISO New York 2025 brings together top cybersecurity leaders
- Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
- Autoswagger: Open-source tool to expose hidden API authorization flaws