Endpoint

ESET PROTECT Advanced Review: Features & Benefits

ESET might not have the name recognition of some other long-time cybersecurity companies, but at around 30 years old, the Slovakia-based company has been...

NSA, CISA Release Guidance for Choosing and Hardening VPNs

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network...

Securing Home Employees with Enterprise-Class Solutions

The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when...

How DMARC Can Protect Against Ransomware

Domain-based Message Authentication, Reporting, and Conformance (DMARC) began gaining traction a few years ago as a way to validate the authenticity of emails. Now it...

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

A pair of vulnerabilities in the Linux kernel disclosed this week expose major Linux operating systems that could let a hacker either gain root...

Microsoft Security Under Scrutiny After Recent Incidents

Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant...

FireEye, Mandiant to Split in $1.2 Billion Deal

FireEye is selling its core cybersecurity products to a group led by private equity firm Symphony Technology Group (STG) in order to focus on...

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim's behalf. Attackers may...

MITRE Protection Tests Shed New Light on Endpoint Security

MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products' ability to stop an...

Bitdefender Review: EDR and Antivirus Security Solutions

Enterprise antivirus software helps keep confidential enterprise data as secure as possible. Malicious actors try to take advantage of penetrable cybersecurity measures and gullible...

Latest articles