Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

cloud building security

IoT security guidance emerges

A new report from the Cloud Security Alliance offers advice on how to secure IoT devices from inception.

trump clinton email spam

Spammers prefer Trump over Clinton, but are rapidly losing faith in Trump

Donald Trump is far and away the favorite presidential candidate of at least one demographic group: spammers, though they are rapidly abandoning him.

3 phishing

Phishing still fools people, but at least more are cautious

Two new IT security studies: One looks at phishing email detection and the other at security fatigue among computer users.

IoT: We're serfs and pawns

The Internet of Things (IoT) is the perfect set of soldiers, and people unwittingly keep deploying insecure devices that allow others to report on us.

100316blog gun in computer

Duct tape, modeling clay and a handgun are not standard computer parts

The TSA may not be the most popular federal agency, but it does put out a blog post every week that is highly entertaining for the look it offers into the scary panoply of weaponry that passengers try to get on planes.

nuclear bomb test bikini atoll mushroom cloud explosion detonate

The IoT is uranium

IoT devices are like uranium—as dangerous as post-Soviet era nuclear weapons.

IoT security: Intel EPID simplifies authentication of IoT devices

Intel's proof of concept based on its Enhanced Privacy ID (EPID) streamlines the authentication and installation of IoT devices.

3d printer lead image

3D printers hackable via smartphone

Hackers can use a smartphone to capture electromagnetic energy and sound emanating from a 3D printer nozzle, allowing them to steal intellectual property.

mobile security stock image one bad device

Enterprises hope their mobile users pay attention to security

Most companies worry about communicating and enforcing their internal mobile security policies, says a new survey.

smartphone sick malware

Smartphone infections double, hotspots are also a trouble area

One out of every 120 smartphones had a malware infection during an April test period, a lab reveals. Android devices were hit the hardest.

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...


Where the monsters live

Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

password protected internet

Americans want passwords, not biometrics, survey finds

Fear of leaky organizations storing personal biometric data might be behind the public’s preference for passwords over biometry for security.

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

information security

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

iot security

ForeScout simplifies IoT security

ForeScout can now secure Internet of Things (IoT) endpoints that were historically unmanageable.


F5 Networks: It’s time to rethink security architecture

Traditional security methods to secure an increasingly cloud-first, mobile-centric world doesn’t work, says F5 Networks. It’s time to modernize security.

06 threat detection

Accenture, Endgame team up to become the Van Helsing of cybersecurity

Accenture and Endgame partner to offer threat hunting as a service, complementing organizations’ cybersecurity efforts.

wellness fitness activity weight lifting

Fitness device security inadequate

Many fitness trackers have a glaring lack of secure connections and can be tampered with to expose private user data, a security firm finds.

Load More