Endpoint

Bitdefender vs. McAfee: Consumer & Enterprise Endpoint Security Software Compared

Endpoint security software is designed to detect, avert, and eradicate malware on endpoint devices like desktop computers, laptops, network servers, and mobile phones. Endpoint security solutions are ...

Top Secure Email Gateway Solutions

Email is typically the channel through which ransomware and malware are unleashed upon the enterprise. Phishing scams use it to compromise networks. Executives are conned by fake emails into sending f...

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized i...

HTML Smuggling Techniques on the Rise: Microsoft

Bad actors are increasingly using a technique called HTML smuggling to deliver ransomware and other malicious code in email campaigns aimed at financial services firms and other organizations, accordi...

The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard....

McAfee’s Consumer Business to Be Acquired by Private Equity Groups

The McAfee consumer security business, which trades on the NASDAQ under the symbol MCFE, will be going private in a deal valued at more than $14 billion. McAfee had sold its Enterprise business jus...

Secure Access for Remote Workers: RDP, VPN & VDI

A fundamental cornerstone of security is layers. We use passwords to authenticate our users, run antivirus to keep malware off our endpoints, monitor our networks, and implement firewalls so we can ha...

IBM Moves Into EDR Market With ReaQta Acquisition

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection a...

CrowdStrike vs Symantec: Top EDR Solutions Compared

Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product list, they're very different ...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Latest articles