Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

multi factor authentication products 1

Buyer’s Guide to 9 multi-factor authentication products

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products.

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known...

Sophos synchronizes endpoint, network security

Sophos Security Heartbeat endpoint software and the firm’s new XG Firewall detect threats, remediate problems.

defenses against super attackes 1

6 super-defenses against super-user attacks

Review: Privileged Identity Management from BeyondTrust, CyberArk, Lieberman Software, NetIQ, Centrify and Viewfinity.

cancelling an it project

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

Endpoint security firm SentinelOne challenges traditional anti-virus software

Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and...

NSA will lose access to 'historical' phone surveillence data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

Former Hacking Team supplier stops selling zero-day exploits on ethical grounds

U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers

Next-generation endpoint protection not as easy as it sounds

Rather than looking for signatures of known malware as traditional anti-virus software does, next-generation endpoint protection platforms analyze processes, changes and connections in order to spot activity that indicates foul play...

Spam rate falls below 50 percent for first time in a decade

Large spamming botnets are harder to run these days

Hacking Team's malware uses UEFI rootkit to survive OS reinstalls

The feature allows the company's software to persist even if the hard disk drive if replaced

Google fine tunes spam catching tools

Postmaster Tools aims to give admins greater insight into why messages may not get through

Ad fraud Trojan updates Flash Player so that other malware can't get in

Despite being distributed through exploit kits, the Kovter Trojan appears to be ruining their business by patching valuable flaws

hacked hacker breach security

Report: Every company is compromised, but most infections not yet at critical stage

In a recent analysis of a quarter million endpoint devices in 40 enterprises, every single corporate network showed evidence of a targeted intrusion but most of the activity was not yet at the most-dangerous data exfiltration stage

Cisco plans to buy security-as-a-service provider OpenDNS

OpenDNS provides Web filtering and malware protection services to 65 million users

Startup Barkly touts light, fast endpoint protection

Product launches later this year, company has enough funding for two more years.

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

In desperation, many ransomware victims plead with attackers

TeslaCrypt creators negotiated with victims, earned over $76,000 in two months

Anti-virus shootout: 7 old-school vendors show off new tricks

Signature-based AV a relic?Image by ShutterstockIn an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APT), signature-based anti-virus may seem like a relic. But traditional anti-virus...

Load More