Endpoint

IBM Moves Into EDR Market With ReaQta Acquisition

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection a...

CrowdStrike vs Symantec: Top EDR Solutions Compared

Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product list, they're very different ...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Windows 11 Security Features & Requirements

Windows 11 started rolling out on October 5 for personal devices, but most businesses are unlikely to get access to the upgrade until the middle of 2022. Regardless of when you get Windows 11, you...

ESET PROTECT Advanced Review: Features & Benefits

ESET might not have the name recognition of some other long-time cybersecurity companies, but at around 30 years old, the Slovakia-based company has been around longer than many of its rivals. And...

NSA, CISA Release Guidance for Choosing and Hardening VPNs

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network (VPN) solutions. VP...

Securing Home Employees with Enterprise-Class Solutions

The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when things return to normal. Remote work po...

How DMARC Can Protect Against Ransomware

Domain-based Message Authentication, Reporting, and Conformance (DMARC) began gaining traction a few years ago as a way to validate the authenticity of emails. Now it may have an even more importan...

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

A pair of vulnerabilities in the Linux kernel disclosed this week expose major Linux operating systems that could let a hacker either gain root privileges on a compromised host or shut down the entire...

Microsoft Security Under Scrutiny After Recent Incidents

Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month iss...

Latest articles