ENDPOINT - ALL ARTICLES - PAGE 1

Different Types of Malware and How to Defend Against Them

|

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

|

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Patch Management: How to Update Software on Your Network Securely

|

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Network Access Control: Restricting and Monitoring Access to Your Network and Data

|

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

|

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

READ MORE

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

|

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.

READ MORE

Endpoint Security: Preventing Threats on Devices Connected to Your Network

|

Endpoint security provides a layer of protection for devices outside the firewall.

READ MORE

Multi-Factor Authentication: A Critical Security Tool for Enterprises

|

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

READ MORE

Google Patches 36 Vulnerabilities in Chrome 57

|

Researcher finds a high impact memory corruption flaw in Chrome's V8 JavaScript engine.

READ MORE

Considerations for Adding FIDO U2F to Your Security Protocol

|

If you're considering using the FIDO U2F protocol, here's what you need to know.

READ MORE

3 Noteworthy Windows Server 2016 Security Features

|

Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.

READ MORE

Mac Malware Part of Worsening Security Picture

|

While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.

READ MORE

Authentic8 Advances Disposable Browser Security Model

|

Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]



READ MORE

Using Microsoft Tools for Policy-driven Security

|

Here is how to use Microsoft tools, including Group Policy ADMX and Group Policy Preferences, to assure policy-driven compliance and security.

READ MORE

New KeRanger Ransomware Targets Mac OS X

|

The malware was signed with a valid Mac app development certificate.

READ MORE

Top 10 Ways to Secure a Windows File Server

|

Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.

READ MORE

10 Apps to Improve iPhone Security

|

Apps like these improve the security of iOS devices like iPhones.

READ MORE

FinalCode 5 Takes Aim at File Encryption Challenge [PODCAST]

|

Scott Gordon, chief operating officer of Final Code, discusses the challenges of file encryption and what his company's new technology is all about.

READ MORE

Adobe Patches 17 Flash Vulnerabilities in Latest Update

|

Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.

READ MORE

Google Chrome 46 Boosts Security

|

Google patches Chrome browser for 24 security issues

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|