Blog Posts Tagged with "Endpoint Security"
Best Practices for Remote Workers’ Endpoint Security
July 22, 2019 Added by:Mathivanan Venkatachalam
One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.
Comments (0)
Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security
November 03, 2017 Added by:Eddy Bobritsky
Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.
Comments (0)
Mobile Endpoint Security: 3 Helpful Tips to Protect Sensitive Corporate Data
December 02, 2016 Added by:Brian NeSmith
Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.
Comments (0)
What to do When Traditional Security Isn’t Enough
June 25, 2013 Added by:Paul Lipman
Relying on traditional security measures to catch the bad guy in action or prevent being the victim of a breach doesn’t cut it in today’s threat landscape, and IT teams don’t have the time and resources to address each threat vector in isolation, nor should they have to.
Comments (1)
Complimentary IT Security Resources [May 13, 2013]
May 13, 2013 Added by:InfosecIsland News
As an Infosec Island reader, we are pleased to offer you the following complimentary IT security resources for the week of May 13, 2013.
Comments (0)
Three Keys to Managing Firewalls for Better Security
September 25, 2012 Added by:Richard Stiennon
The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...
Comments (1)
The 2006 Theft of Symantec's Source Code - Response and Repercussions
January 26, 2012 Added by:Jeffrey Carr
Symantec has acknowledged that source code for multiple products was stolen in 2006. The worst part is that Symantec was clueless about the theft of its own source code for almost six years, which means that thousands of customers were clueless as well...
Comments (1)
Remote Management as a Complement to Endpoint Security
October 31, 2011 Added by:Kanguru Solutions
Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...
Comments (0)
E2E Encryption and Doctored Credit Card Terminals
May 26, 2011 Added by:PCI Guru
End-to-end encryption just moves the attack points, in this case out to the terminal at the merchant’s location. Worse yet, it also makes security of the merchant’s endpoint even more difficult than it already is because the techniques used in doctoring terminals can easily go unnoticed...
Comments (0)
Convenience or Security?
May 19, 2011 Added by:Emmett Jorgensen
Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...
Comments (0)
The Evolution of Endpoint Attacks
February 22, 2011 Added by:Don Eijndhoven
Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...
Comments (3)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization