Please turn on your JavaScript for this page to function normally.
Endpoint protection attitudes and opinions

Bromium surveyed more than 300 information security practitioners focused on endpoint threats and security. The overwhelming majority of information security professionals …

A new defense against kernel-mode exploits

Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …

Why endpoint backup is critical

Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …

Using ITOA to secure endpoints

Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user …

Making the web a safe place to visit

The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …

CoSoSys updates Endpoint Protector 4

At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection …

Quickly identify and act on endpoint security issues

Promisec announced plans for Promisec Integrity, a series of cloud-based offerings to help small-to-medium enterprise organizations with endpoint security and remediation. The …

Threat detection for remote users by OPSWAT

OPSWAT announced the official release of GEARS, a cloud-based network security management platform that offers advanced threat detection for remote users by identifying …

Free tool helps fend off most cyber attacks

Today at the RSA Conference Qualys announced that it has collaborated with the SANS Institute and the Council on CyberSecurity to release a new free tool to help organizations …

Nearly half of companies assume they have been compromised

A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS …

Microsoft EMET’s protections can be bypassed, researchers show

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a good piece of software and helpful for protecting non-kernel Microsoft applications and third-party …

What’s the greatest security risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …

Don't miss

Cybersecurity news