The latest best practices and technologies for securing endpoints.
Managing machine identities has never been more critical to an enterprise’s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper management of machine-to-machine communications, all those machines can become a huge security issue. Gartner’s list of the top security risks and trends… Read more
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network (VPN) solutions. VPNs, an important security tool in an era of widespread remote work, are entry points into secured networks that bad attackers frequently try to use in malicious assaults. Because… Read more
The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when things return to normal. Remote work poses unique risks not addressed by traditional corporate network security, so it’s only natural that enterprise security vendors have been targeting work-at-home employees with more… Read more
Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed “PrintNightmare.” Sangfor had published the exploit code,… Read more
FireEye is selling its core cybersecurity products to a group led by private equity firm Symphony Technology Group (STG) in order to focus on its Mandiant threat response and services business. FireEye’s products span network, email, endpoint and cloud security, and the vendor has been pursuing an XDR platform approach to unite them all. The… Read more
MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products’ ability to stop an adversarial attack. Previous MITRE evaluations and the first part of the latest evaluation, Carbanak+FIN7, focused on the ability of vendors to detect attacks and alert security staff. That detection approach focuses… Read more
Enterprise antivirus software helps keep confidential enterprise data as secure as possible. Malicious actors try to take advantage of penetrable cybersecurity measures and gullible employees to gain access to enterprise networks. Once malware infects a device in an enterprise network, the virus can spread to other computers on the same network and create havoc by… Read more
MITRE Engenuity last month released the latest MITRE ATT&CK evaluations of endpoint security products, and the results contain some pretty big surprises. MITRE doesn’t analyze or comment on the evaluations and instead just makes the data available for vendors and cybersecurity buyers to use as they see fit. That said, the raw numbers alone contain… Read more