endpoint security
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Transitioning from vulnerability management to vulnerability remediation
Like many people, I’m glad 2020 is almost over. I am, however, excited about 2021. Here are three trends I believe will impact how well (or not) companies will be able to …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
Only 30% prepared to secure a complete shift to remote work
The biggest security concerns facing businesses are data leaking through endpoints (27%), loss of visibility of user activity (25%) and maintaining compliance with regulatory …
![gear](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093123/gear-400x200.jpg)
Automation to shape cybersecurity activities in 2021
Automation will play a major role in shaping cybersecurity attack and defence activities in 2021, WatchGuard predicts. Traditionally a high-investment, high-return targeted …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
A perspective on security threats and trends, from inception to impact
Sophos published a report which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level, will shape the threat landscape and IT security in …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093354/mac-laptop-400x200.jpg)
The power of trusted endpoints
The story of digital authentication started in an MIT lab in 1961, when a group of computer scientists got together and devised the concept of passwords. Little did they know …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
Network visibility critical in increasingly complex environments
Federal IT leaders across the country voiced the importance of network visibility in managing and securing their agencies’ increasingly complex and hybrid networks, according …
![Code](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/10182058/code-glasses-400x200.jpg)
How important are vulnerability management investments for a cybersecurity posture?
Vulnerability management (VM) technology addresses the threat landscape, which is in a constant state of flux. The wider dispersal of endpoints across private and public cloud …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
CISOs split on how to enable remote work
CISOs are conflicted about how their companies can best reposition themselves to address the sudden and rapid shift to remote work caused by the pandemic, Hysolate research …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
The anatomy of an endpoint attack
Cyberattacks are becoming increasingly sophisticated as tools and services on the dark web – and even the surface web – enable low-skill threat actors to create highly evasive …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Most enterprises struggle with IoT security incidents
The ongoing global pandemic that has led to massive levels of remote work and an increased use of hybrid IT systems is leading to greater insecurity and risk exposure for …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094840/phishing1-400x200.jpg)
Employees increasingly masking online activities
This year’s shift to a near 100% WFH workforce by the Global 5000 has significantly changed the behaviors of trusted insiders, a DTEX Systems report reveals. Key findings …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Using virtualization to isolate risky applications and other endpoint threats
More and more security professionals are realizing that it’s impossible to fully secure a Windows machine – with all its legacy components and millions of potentially …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege