Endpoint protection and client security
Get information on client security pratcices, including how to build, implement and maintain secure endpoint protection products and procedures for keeping your network safe from potentially unsecure laptops, desktops, and other endpoint devices.
Top Stories
-
News
12 Oct 2021
Cybereason and Google Cloud join forces for new XDR service
Cybereason and Google Cloud have teamed up to combat future security threats with accelerated XDR capabilities. Continue Reading
By- Arielle Waldman, News Writer
-
News
29 Sep 2021
Telegram bots allowing hackers to steal OTP codes
A simplified new attack tool based on Telegram scripts is allowing criminals to steal one-time password credentials and take over user accounts and drain bank funds. Continue Reading
-
News
12 Mar 2018
IIC addresses industrial IoT security on endpoints
In a new document, the Industrial Internet Consortium abridges IEC and NIST publications, offering clear, concise guidance to ensure IIoT security in connected plants. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
08 Feb 2018
Mobile security issues require a unified approach
Security gaps in mobile devices can be many and varied, but they must be addressed immediately. Unified endpoint management is the next-gen way to close the gaps. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
08 Feb 2018
Counter mobile device security threats with unified tools
Attacks on enterprise mobile endpoints are more lethal than ever. To help infosec pros fight back, enterprise mobile management has unified to fortify defenses. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
30 Jan 2018
Cryptojacking: How to navigate the bitcoin mining threat
Due to the rising value of bitcoin and other cryptocurrency, hackers have started to use cryptojacking to mine bitcoin. Learn what this means for end users with expert Nick Lewis. Continue Reading
By -
Tip
11 Jan 2018
Security compliance standards as a guide in endpoint plans
Consider security compliance regulations for your industry as a starting point and a guide for planning your specific approach to enterprise endpoint protection. Continue Reading
By -
Tip
11 Jan 2018
The endpoint security controls you should consider now
With the perimeter wall gone, securing enterprise endpoints is even more essential. Learn how automation and other developments can up endpoint protection now. Continue Reading
By -
Feature
05 Jan 2018
Six questions to ask before buying enterprise MDM products
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
-
Answer
10 Nov 2017
VMware AppDefense: How will it address endpoint security?
VMware announced AppDefense, its latest effort to help improve endpoint security. Matt Pascucci explains how AppDefense addresses applications in vSphere environments. Continue Reading
-
Answer
25 Oct 2017
How did a Windows Defender antivirus bug enable remote exploits?
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it happened, and what to do about it. Continue Reading
By -
Answer
23 Oct 2017
HP keylogger: How did it get there and how can it be removed?
A keylogging flaw found its way into dozens of Hewlett Packard laptops. Nick Lewis explains how the HP keylogger works and what can be done about it. Continue Reading
By -
Tip
02 Oct 2017
Securing endpoints with supplementary tools protects data
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
By -
Podcast
27 Sep 2017
Risk & Repeat: Kaspersky ban turns ugly
In this week's 'Risk & Repeat' podcast, SearchSecurity editors discuss the U.S. government's Kaspersky ban and how competitors like McAfee are trying to capitalize on it. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
27 Sep 2017
PINLogger: How does this exploit steal PINs?
The proof-of-concept PINLogger attack exploits mobile device sensors to steal PINs. Nick Lewis explains how the attack works and offers advice on how to stop it. Continue Reading
By -
Answer
28 Aug 2017
How should IT manage connected devices?
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Answer
25 Aug 2017
How is cross-platform malware carried in Word docs?
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks work and how to defend against them. Continue Reading
By -
Answer
24 Aug 2017
ATMitch malware: Can fileless ATM malware be stopped?
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it spreads. Continue Reading
By -
Answer
10 Aug 2017
Libpurple flaw: How does it affect connected IM clients?
The libpurple library contains a code execution vulnerability that affects the IM clients that were developed using it. Expert Michael Cobb explains how the flaw works. Continue Reading
By -
Tip
09 Aug 2017
Clear cached credentials with the cmdkey and PowerShell
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading
By -
News
03 Aug 2017
Symantec Website Security, certificate authority business sold to DigiCert
DigiCert agrees to buy majority stake in Symantec Website Security just days after Google releases an April 2018 distrust date for Symantec certificates. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Feature
02 Aug 2017
Symantec Endpoint Protection and the details for buyers to know
Expert Ed Tittel examines Symantec Endpoint Protection, an intrusion prevention, firewall and antimalware product for physical and virtual endpoints. Continue Reading
By -
Feature
02 Aug 2017
A closer look at Kaspersky antimalware protection services
Expert Ed Tittel looks at Kaspersky antimalware product Endpoint Security, which provides multilayered protection against malware, phishing attacks and other exploits. Continue Reading
By -
Feature
01 Aug 2017
Details of Trend Micro Worry-Free Business Security Services
Expert Ed Tittel takes a closer look at Trend Micro Worry-Free Business Security Services, an antivirus and antimalware product for small organizations. Continue Reading
By -
Feature
31 Jul 2017
Trend Micro OfficeScan endpoint protection software and its offerings
Expert contributor Ed Tittel takes a look at Trend Micro OfficeScan, an endpoint protection product with antivirus and antimalware functionality for physical and virtualized endpoints. Continue Reading
By -
Feature
31 Jul 2017
The various offers of Microsoft System Center Endpoint Protection
Expert Ed Tittel examines System Center Endpoint Protection, Microsoft's native Windows antivirus and antimalware security product. Continue Reading
By -
Feature
28 Jul 2017
An in-depth look into McAfee Endpoint Threat Protection
McAfee Endpoint Threat Protection is an antimalware protection product that is designed to secure Windows systems against malware, data loss and other threats in standalone or networked environments. Continue Reading
By -
Feature
27 Jul 2017
Sophos Endpoint Protection and an overview of its features
Expert Ed Tittel examines Sophos Endpoint Protection, an endpoint security platform with antivirus, antimalware and more. Continue Reading
By -
Answer
27 Jul 2017
What tools were used to hide fileless malware in server memory?
Fileless malware hidden in server memory led to attacks on many companies worldwide. Expert Nick Lewis explains how these attacks fit in with the wider fileless malware trend. Continue Reading
By -
Podcast
19 Jul 2017
Risk & Repeat: Kaspersky Lab removed from GSA Schedule 70
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Trump administration's removal of Kaspersky Lab from the GSA Schedule 70 for federal IT contracts. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
13 Jul 2017
Evaluating endpoint security products for antimalware protection
Expert contributor Ed Tittel explores key criteria for evaluating endpoint security products to determine the best option for antimalware protection for your organization. Continue Reading
By -
E-Zine
10 Jul 2017
The best endpoint security practices are evolving and essential
Ever since the first mobile device hit the enterprise network, best endpoint security practices have been a major IT concern. What's happened since then has been a staggering proliferation of the number and types of devices on the network, complicated by increasing numbers of mobile and remote corporate employees, all of which have essentially ended the traditional idea of a corporate network security perimeter. Firewalls and other more traditional security appliances may still be in use, and rightly so, but endpoint security management is more critical than ever in keeping enterprise systems and data safe from malicious actors.
The summer Insider Edition, our Information Security magazine quarterly e-zine, looks at what's new in endpoint security management, from the best endpoint security tools to consider now, and what other efforts beyond tools infosec pros can employ to best secure all those pesky mobile endpoints wandering in and out of corporate corridors.
This Insider Edition offers expert assessments on the endpoint security technology vendors have developed to combat mutating ransomware like WannaCry -- from machine learning to multivendor partnerships to behavior analytics. Also included is an exploration of mobile endpoint security tools like application containers and app wrapping. CISOs must focus now on how the threats, and the technological advances to fight them, are changing and factor these considerations into any endpoint security strategy.
Readers will come away with a deeper understanding of the best endpoint security tools and techniques available and be able to consider the most advanced approaches available to locking down the company data and systems that endpoints can access.
Continue Reading -
Feature
10 Jul 2017
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints. Continue Reading
By- David Geer, Geer Communications
-
Opinion
10 Jul 2017
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
- 05 Jul 2017
- 05 Jul 2017
-
Answer
04 Jul 2017
How did Webroot's antivirus signature update create false positives?
A Webroot antivirus signature update flagged Windows and Windows applications as dangerous. Expert Matthew Pascucci explains how it happened and what Webroot did about it. Continue Reading
-
Answer
23 Jun 2017
Fruitfly Mac malware: How does its decades-old code work?
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis explains how it works. Continue Reading
By -
Answer
20 Jun 2017
Heartbleed vulnerability: Why does it persist on so many services?
The Heartbleed flaw still impacts almost 200,000 services connected to the internet. Expert Nick Lewis explains why these services remain unpatched and vulnerable. Continue Reading
By -
Tip
08 Jun 2017
Embedded malware: How OLE objects can harbor threats
Nation-states have been carrying out attacks using RTF files with embedded malware. Expert Nick Lewis explains how OLE technology is used and how to protect your enterprise. Continue Reading
By -
Podcast
25 May 2017
Using threat intelligence tools to prevent attacks on your enterprise
Using threat intelligence tools can help your enterprise stay one step ahead of attackers and possible threats. Learn how threat intelligence can be used in your company. Continue Reading
By -
Answer
24 May 2017
How does the Stegano exploit kit use malvertising to spread?
A malvertising campaign by the AdGholas group has been found spreading the Stegano exploit kit. Expert Nick Lewis explains how web advertisements are used in this attack. Continue Reading
By -
Answer
23 May 2017
How does Rakos malware attack embedded Linux systems?
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on their systems. Continue Reading
By -
Guide
04 May 2017
Mobile endpoint security: What enterprise infosec pros must know now
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
-
Answer
24 Apr 2017
How does Ticketbleed affect session ID security?
The Ticketbleed bug in some F5 Networks products caused session IDs and uninitialized memory to leak. Expert Judith Myerson explains what a session ID is and how attackers use it. Continue Reading
-
Podcast
22 Feb 2017
Top three steps to ensure security in big data environments
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data. Continue Reading
By- John Burke, Nemertes Research
-
Definition
09 Dec 2016
disposable phone number
A disposable phone number is a virtual phone number that is usable temporarily. The temporary number is purchased from a service provider. Calls to that number are forwarded to the user’s existing phone. Continue Reading
-
Tip
11 Jan 2016
Microsoft Device Guard tackles Windows 10 malware
A new Microsoft security feature takes aim at Windows 10 malware. Expert Michael Cobb explains what enterprises should know about Device Guard. Continue Reading
By -
Tip
15 Oct 2015
Is a security cloud service your best endpoint defense?
Cloud technologies often have a bad reputation when it comes to security, but that may be unfair. Is the cloud the best answer for securing the endpoints in your enterprise? Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
News
28 Aug 2015
Internet of Things security concerns prompt boost in IoT services
News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise. Continue Reading
By- Sharon Shea, Executive Editor
-
Buyer's Guide
10 Jul 2015
Endpoint security tools: A buyer's guide
Learn how to evaluate and buy the right endpoint security products for your organization with this antimalware buyer's guide. Continue Reading
-
Tip
30 Apr 2015
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Tip
09 Jan 2015
What is endpoint security? What benefits does it offer?
The increased number of smartphones, laptops and other endpoints in the enterprise is a major security concern. Learn what endpoint security is and how it can help combat your enterprise security woes. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
News
18 Feb 2014
Cut Microsoft admin rights to mitigate 92% of threats, study shows
Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Sep 2013
HP introduces 'self-healing' BIOS protection with SureStart
HP's new SureStart feature detects and 'heals' corrupted BIOS code. Continue Reading
-
Feature
25 Feb 2013
Outsourcing security services in the enterprise: Where to begin
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
06 Dec 2011
P2P encryption: Pros and cons of point-to-point encryption
P2P encryption is an emerging technology; one that may be helpful for many companies, especially merchants. Mike Chapple dissects the pros and cons. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
02 Jul 2009
How to defend against rogue DHCP server malware
Rogue DHCP server malware is a new twist on an old concept. The good news is that effective threat mitigation strategies exist; the bad news is that many organizations haven't bothered to deploy them. Continue Reading
By- Sherri Davidoff, LMG Security