Skip Links

Endpoint Security Research Center

Your source for the latest news, opinion, product comparisons and reviews of endpoint security and NAC tools.

Endpoint Security News
Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake...
Fortinet, McAfee, Trend Micro, Symantec, Bitdefender battle in socially-engineered malware prevention test
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake...
Can Heartbleed be used in DDoS attacks?
With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in...
Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
The Heartbleed Bug disclosed by the OpenSSL group on April 7 has sent many vendors scurrying to patch their products and that includes security firms...
Who's to blame for 'catastrophic' Heartbleed Bug?
The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL,...
New federal rule requires banks to fight DDoS attacks
Banks and financial institutions regulated by the federal government must now monitor for distributed denial-of-service (DDoS) attacks against their...
Security pros talk about playing defense against cybercrime
Security professionals are playing defense against cybercrime, and often feel outgunned by tech-savvy hackers and insiders out to steal sensitive...
How to respond to a data breach
Data breaches seem to be happening at an absurdly rapid rate these days with reported incidents involving the theft of personally identifiable...
FireEye, AhnLab score low in lab test of breach detection systems
In an evaluative lab test, FireEye and Ahnlab each scored “below average” on their breach-detection systems (BDS) in a comparative group product test...
Encrypting sensitive data is a must; new key management tools make it easy
Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even...
Patch management flubs facilitate cybercrime
Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary’s...
How do the FBI and Secret Service know your network has been breached before you do?
Knock, knock! Secret Service here.  "Is this your customer payment card data?"
Can anti-virus technology morph into breach detection systems?
Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades,...
Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being...
RSA chief: NSA exploited 'position of trust'; should spin-out security tech group
Did the National Security Agency trick RSA, the security division of EMC, into including a crypto algorithm that was really an NSA cyber-espionage...
K-12 schools can make the grade with identity and access management
School districts across the country are looking for ways to stretch their meager funding. An identity and access management system can help the IT...
Start-up debuts 'shape-shifting' technology to protect web servers
Backed by a lineup of elite investors, start-up Shape Security comes out of stealth mode today by announcing technology it calls Shapeshifter that is...
A look at FireEye's Mandiant buy: Game changer or not?
FireEye's acquisition of Mandiant is getting generally positive reviews from industry analysts, though some caution that FireEye faces a big...
'PGP' encryption has had stay-powering but does it meet today's enterprise demands?
PGP encryption, as industry old-timers know, started out as "Pretty Good Privacy" invented by Phil Zimmermann in 1991, and since then, was sold on to...
ZeroAccess bot-herders abandon click-fraud network
Microsoft is claiming a total victory – at least for this round – over the ZeroAccess bot-herders whose criminal network was the target of a joint...