Network November 30, 2017 The History and Reinvention of NAC 2 min read - Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.
Endpoint November 30, 2017 The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails 3 min read - Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
Endpoint November 29, 2017 Moving Target Defense: A Digital Shell Game 3 min read - Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
Endpoint November 17, 2017 Fileless Malware Prompts Evolution of Endpoint Defenses 2 min read - A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses.
Endpoint November 9, 2017 Making the Case for Containment With WIP 3 min read - When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
Intelligence & Analytics November 8, 2017 Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts 2 min read - As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
Endpoint October 9, 2017 Five Key Differences Between Personal and Enterprise Endpoint Security 3 min read - CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Endpoint August 25, 2017 Personal Electronic Devices Dodge TSA Ban — For Now 2 min read - To the chagrin of enterprise security experts, the TSA recently decided against a proposed ban on packing personal electronic devices in carry-on luggage.
Cloud Security August 15, 2017 Best Practices for Developing and Securing a Microservices Architecture 2 min read - When installing a microservices architecture, SecDevOps teams must understand the threat vectors and how they affect the company's compliance stature.