endpoint security
![click](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093327/click-400x200.jpg)
Surge in remote working reveals concerns around unprotected endpoints
Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
Organizations struggle with patching endpoints against critical vulnerabilities
Less than 50 percent of organizations can patch vulnerable systems swiftly enough to protect against critical threats and zero-day attacks, and 81 percent have suffered at …
![Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/18135137/trend_micro-logo-red-400x200.jpg)
Trend Micro fixes two actively exploited zero-days in enterprise products
Trend Micro has fixed two actively exploited zero-day vulnerabilities in its Apex One and OfficeScan XG enterprise security products, and advises customers to update to the …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
Can 5G make you more vulnerable to cyberattacks?
Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092735/bomb2-400x200.jpg)
Corporate cybersecurity concerns and spend continue to rise, but so do breaches
More than 50 percent of security and IT leaders agree that they are very concerned about the security of corporate endpoints given the prevalence of sophisticated attack …
![Headache](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195350/headache-400x200.jpg)
One in five SMBs use no endpoint security at all
An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Most credential abuse attacks against the financial sector targeted APIs
From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls. …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/11151617/apple-orange-400x200.jpg)
Mac threats are growing faster than their Windows counterparts
Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats, according …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093155/ransomware-400x200.jpg)
Ransomware uses vulnerable, signed driver to disable endpoint security
Ransomware-wielding attackers have devised a novel tactic for disabling security protections that might get in their way: they are using a deprecated, vulnerable but signed …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
68% of organizations were victims of endpoint attacks in 2019
Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security …
![Windows 7](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094455/windows7-400x200.jpg)
Windows 7 is reaching end-of-extended-support, what to do?
Windows 7, released in October 2009, was one of Microsoft’s big successes. Ten years later and despite its end-of-extended-support deadline being imminent (January 14, …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095949/tunnel-400x200.jpg)
Driving collaboration between security and IT ops teams is a major challenge
Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege