Endpoint

Endpoint Detection and Response Selection Tool

Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to...

IObit Advanced SystemCare Ultimate 11 Adds Anti-Ransomware

Ransomware emerged as one of the biggest threats to PC users in 2017....

Keeper Security Update Protects Password Flaw

It's the email no security company really wants to get - a message...

Amazon Wants to Secure Things from the Cloud with IoT Device Defender

Amazon Web Services (AWS) announced a new Internet of Things (IoT) security...

Secdo 5.0 Makes Behavioral-Based Bet on Automated Incident Response

Secdo, a New York City cybersecurity startup, launched version 5.0 of its incident response platform with a new Behavioral Based Indicators of...

Symantec Brings Deception Technology to Endpoint Security

Symantec's latest update to its endpoint security product suite uses deception techniques...

KnowBe4 Raises $30M to Advance Security Awareness

There is money to be made in lots of different areas of the cyber security market, including training and awareness. That's the...

Attivo Networks Raises $21M to Boost Cyber-Deception Tech

Cybersecurity startup Attivo Networks announced on Oct. 11 that it has raised a new $21 million Series C round of funding.The new...

ForeScout Files for $100M IPO to Advance Network Access Control Security

After 17 years in business, security vendor ForeScout has decided that it is going to test the public capital markets. On Oct....

BullGuard Supercharges Its Anti-Malware Engine

BullGuard, a London cybersecurity software provider, unveiled a new anti-malware engine that will enable its portfolio of products, BullGuard Premium Protection, Internet...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...