Endpoint Security

Endpoint Security news, trend analysis and opinion

Thoughts on incident response automation and orchestration

Projects are well underway and evolving, while commercial incident response tools continue to gain momentum.


Cybersecurity pros to Trump: Critical infrastructure very vulnerable to cyber attack

The Trump administration should enlist the help of true cybersecurity professionals, rather than political insiders, to put an effective national plan together.

2017: The year of cybersecurity scale

Cloud, IoT, mobile and digital transformation will place new demands on usability, scalability and enterprise-class features of cybersecurity analytics and operations products.

Security data growth drives SOAPA

Security professionals want better ways to analyze and operationalize the massive increase in security data collection and processing. SOAPA can help

Looking back to look forward on cybersecurity

There have been lots of activities over the past two years that will only gain more traction in 2017.

iot threats

Lax IoT device security threatens to pollute the internet

DDoS attacks powered by hijacked IoT devices have the potential to do much more than take down popular websites.


IoT could be our downfall

We need to secure the internet of things.

primary intro
Clear Choice Tests

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

5 cybersecurity trends to watch for 2017

A mix of fresh and familiar threats and problems will concern IT departments in the year ahead.

information security

Looking to 2017: It’s not just enterprise security

Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse.

041916aruba sign

Aruba flexes some IoT muscle

Aruba’s new products, including ClearPass Universal Profiler and the new 2540 series switch, position the company as an IoT enabler.

Trump cybersecurity dos and don’ts (Part 2)

President Trump must balance partisan politics with the pragmatic realities of cybersecurity.

Trump cybersecurity dos and don’ts (Part 1)

President-elect Trump could make strong progress on cybersecurity while adhering to his campaign promises.

Goodbye SIEM, hello SOAPA

SIEM systems are becoming part of a dynamic and evolving security analytics and operations architecture.

06 bank accounts atm

Advice for evading ATM skimmers

I cannot use an ATM these days without wondering if I am getting ripped off by a stealthy skimming device that has been placed inside the machine’s card slot.

Trend Micro’s Enterprise Play

Long known for endpoint security, Trend now offers end-to-end cybersecurity solutions for enterprise organizations

cybersecurity ts

Residential routers easy to hack

Home routers are flawed and vulnerable to being hacked, claims security firm ESET.


Media fails to tell consumers about device flaws in Friday’s internet outage

When reporting on Friday’s DDoS attack, the national media should have warned consumers not to install internet-connected devices that have a 4-year-old flaw.

analytics network monitoring

GuardiCore helps security teams see into apps and networks before they segment

GuardiCore Reveal lets security teams discover, monitor and visualize activity inside applications and networks, as well as control traffic through micro-segmentation policies.

Load More