endpoint security
New BlackPOS variant masquerades as AV service
Before the Backoff point-of-sale malware received deserved attention, the main player in the PoS malware field was BlackPOS (or Kaptoxa), the memory-scraping malware that was …
Unified solution for dynamic mitigation of cyberattacks
At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …
Gemalto to acquire SafeNet
Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
Endpoint security myths and why they persist
In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles …
The impact of IoT on IT infrastructure
Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity …
Endpoint protection attitudes and opinions
Bromium surveyed more than 300 information security practitioners focused on endpoint threats and security. The overwhelming majority of information security professionals …
A new defense against kernel-mode exploits
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …
Why endpoint backup is critical
Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …
Using ITOA to secure endpoints
Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …
CoSoSys updates Endpoint Protector 4
At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection …