endpoint security
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113044/vault-1-400x200.jpg)
Ransomware attacks escalate, companies largely unprepared
Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …
![subgraph os](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113306/subgraph-os-400x200.jpg)
Subgraph OS: Open source, hardened OS that prioritizes security and anonymity
Subgraph, an open source security company based in Montreal, has published the alpha release of Subgraph OS, which is designed to with security, anonymity AND usability in …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
Linux security isn’t enough to stop data breaches
There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113510/fire-400x200.jpg)
McAfee uses web beacons that can be used to track and serve advertising to users
A test of seven OEM laptops running Windows has shown consistent privacy and security issues, including an interesting revelation that the McAfee Antivirus running on six of …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113539/keyboard-1-400x200.jpg)
Insight into critical data remains limited
SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113830/detect-400x200.jpg)
Dell SecureWorks speeds up endpoint intrusion detection, response
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113919/abstract3-400x200.jpg)
Critical gaps in IT departments’ approach to enterprise security
A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …
![cososys Endpoint Protector](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113944/cososys-EndpointProtector-400x200.jpg)
Endpoint Protector: Fight data leakage on Linux workstations
At RSA Conference 2016 in San Francisco, CoSoSys released Endpoint Protector DLP for Linux in Private Beta, enabling protection against data leakages for confidential data on …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
The rise of polymorphic malware
97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114023/linux-400x200.jpg)
Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Endpoint security really can improve user experience
Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …
![User key](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195246/user-key-400x200.jpg)
Surge in endpoints drives need for security
The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)