Endpoint December 7, 2017 When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks 5 min read - Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
Endpoint November 30, 2017 The Case for Endpoint Detection and Response Tools: Why Traditional Protection Fails 3 min read - Following recent malware evolution, modern endpoint detection and response tools should not rely on just one trigger event, but on sophisticated logic.
Intelligence & Analytics November 8, 2017 Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts 2 min read - As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
Endpoint October 9, 2017 Five Key Differences Between Personal and Enterprise Endpoint Security 3 min read - CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
August 17, 2017 RDP Risk Leaves Enterprises Exposed to Attackers 2 min read - Millions of ports are being left open online, and many of these are being exposed to potential attackers through the remote desktop protocol (RDP).
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Artificial Intelligence July 18, 2017 Responsive Machine Learning: The Necessary Evolution of Endpoint Security 4 min read - With responsive machine learning, analysts can create robust training sets by combining thousands of malware samples with current data on software updates.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
June 1, 2017 Chipotle Data Breach Investigation Shows Fraudsters Aimed at Endpoints 2 min read - Chipotle released the results of an internal investigation that revealed poor endpoint security and maintainance was to blame for a data breach.