endpoint security
Endpoint backup, recovery and data security
i365 launched EVault Endpoint Protection (EVault EP), an integrated cloud-connected backup, recovery, and data security solution that protects endpoint devices. EVault EP not …
The fundamental failure of endpoint security
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
Security concerns around “backdoor” mobile devices
Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …
The complex world of endpoint security
Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing …
Growing focus on endpoint security
90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …
App-blocking whitelisting that complements antivirus software
GlobalSCAPE announced that the company is developing appShield, an new computer security product for home and small business computers. AppShield is based on proven …
Hardware keyloggers found on library computers
Public computers are usually not the best way to check your banking accounts, do online reservations or shopping. But, for people who don’t have access to a computer at …
Central management of self-encrypting hard drives
Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
A global shift in cybercrime
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
Endpoint security: The year ahead
Predicting the distant future of IT security is tricky, but the near future – the next 12 to 18 months – is a little easier. After all, the seeds of what is to …
McAfee provides unified endpoint management
McAfee released Enterprise Mobility Management 9.5 which includes integration with the McAfee ePolicy Orchestrator platform, providing customers with unified management of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD