Endpoint

Hiding Devices Using Port Knocking or Single-Packet Authorization (SPA)

Invisibility sounds like something out of a fantasy novel, but if done properly, we can use it to hide computers, gateways, or individual PCs by implementing specific firewall techniques like port kno...

Zero-Click Attacks a Growing Threat

Most attacks make would-be victims click to install malware or redirect them to a phishing page to steal their credentials. Zero-click attacks remove this hurdle. They can compromise the targeted d...

Malwarebytes vs Bitdefender Comparison: Which One is Best?

Malwarebytes and Bitdefender are two of the most recognized names in the cybersecurity market for the latest antivirus software, endpoint detection and response (EDR), and endpoint protection platfor...

Becoming an MSSP: Tools, Services & Tips for Managed Security Services

The next few years will see a surge in channel spending. According to Jay McBain, an analyst at Forrester Research, spending on IT and telecommunications will be worth about $7 trillion by 2030. The c...

5 Trends in Patch Management for 2022

The profile of patch management has risen considerably in the last year due to the number of major breaches that have taken place where basic patches had been overlooked. News stories repeatedly note ...

Cybersecurity ‘Vaccines’ Emerge as Ransomware, Vulnerability Defense

Cybersecurity vaccines are emerging as a new tool to defend against threats like ransomware and zero-day vulnerabilities. Cybersecurity firms have released "vaccines" in recent days to protect agai...

MITRE Expands Security Testing to Services, Deception Tools & More

MITRE is moving beyond its well-regarded endpoint security evaluations and will soon be testing other security services and products. MITRE recently issued a call for participation for ATT&CK E...

Bitdefender vs. McAfee: Consumer & Enterprise Endpoint Security Software Compared

Endpoint security software is designed to detect, avert, and eradicate malware on endpoint devices like desktop computers, laptops, network servers, and mobile phones. Endpoint security solutions are ...

Top Secure Email Gateway Solutions for 2022

Email is typically the channel through which ransomware and malware are unleashed upon the enterprise. Phishing scams use it to compromise networks. Executives are conned by fake emails into sending f...

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized i...

Latest articles