endpoint security

Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
16 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
13 Apr 2021
What is ethical hacking? White hat hackers explained
A graphic displaying an ethical hacker
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
9 Apr 2021
New Mirai variant spotted targeting network devices
Image of small robots connected to represent a botnet
malware

New Mirai variant spotted targeting network devices

Palo Alto researchers claim exploit code for ten vulnerabilities have been used so far
17 Mar 2021
Restricting admin rights heavily mitigates impact of Microsoft flaws
The Windows (start menu) key on a keyboard
vulnerability

Restricting admin rights heavily mitigates impact of Microsoft flaws

Businesses may have dampened the effects of a 48% year-on-year rise in vulnerabilities by simply restricting privileges
17 Mar 2021
Remote workforce security report
remote workforce security report - whitepaper from Oktawhitepaper
Whitepaper

Remote workforce security report

Key challenges, security threats, and investment priorities of organisations during the pandemic
10 Mar 2021
Okta agrees to buy rival Auth0 for $6.5 billion
Graphic depicting the merger between Okta and Auth0
identity and access management (IAM)

Okta agrees to buy rival Auth0 for $6.5 billion

The merger will see Okta’s cloud-based identity services and Auth0’s backend user management services combine
4 Mar 2021
Hackers turn to 'silent stealing' in bid to exploit home workers
Man holding an empty wallet with laptop in background
scams

Hackers turn to 'silent stealing' in bid to exploit home workers

Cyber criminals are abandoning large-scale heists in favour of scams that earn them significantly smaller amounts of money
22 Feb 2021
What is WannaCry?
Somebody sitting at their desk in front of various devices that have been locked by WannaCry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
4 Feb 2021
Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism
An iPhone user texting using the iMessage app
iOS

Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism

This protective layer sandboxes incoming iMessages to protect users from malicious texts
29 Jan 2021
McAfee’s MVISION XDR takes security beyond the endpoint
McAfee MVISION XDR diagram
cloud security

McAfee’s MVISION XDR takes security beyond the endpoint

Cloud-native MVISION XDR tool detects threats and predicts countermeasures before a system is compromised
28 Jan 2021
Patch management vs vulnerability management
Plasters over a hard disc drive to symbolise patch management
enterprise security

Patch management vs vulnerability management

What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
27 Jan 2021
BIOS security: The next frontier for endpoint protection
How to stop breaches at BIOS level - whitepaper from Dellwhitepaper
Whitepaper

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures
12 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach
Security lock cyber protection
Security

AWS CISO urges companies to adopt a zero-trust security approach

Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Bitdefender debuts cloud-based endpoint detection and response solution
Endpoints on a background of a city
endpoint security

Bitdefender debuts cloud-based endpoint detection and response solution

New solution enables quick visibility into vulnerabilities, both on-premises and in the cloud
2 Dec 2020
Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?

Each of these popular cloud platforms boasts robust security - but which does it best?
20 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
Lookout reveals mobile-first endpoint detection and response solution
Lookout logo on white background
Security

Lookout reveals mobile-first endpoint detection and response solution

New EDR solution looks beyond the typical malware for threats on mobile devices
21 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
An anonymous mobile phone user using their device in a darkened room
Security

Mobile browser flaw exposes users to spoofing attacks

Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
BlackBerry Persona Desktop delivers zero-trust security at the endpoint
screen showing BlackBerry Persona interface
Security

BlackBerry Persona Desktop delivers zero-trust security at the endpoint

New security solution learns user behavior and can take action if there’s an abnormality
6 Oct 2020
Apple's T2 security chip has an "unpatchable" vulnerability
A partially-closed Macbook displaying a range of colours
Security

Apple's T2 security chip has an "unpatchable" vulnerability

Exploiting the checkm8 and blackbird flaws can grant attackers control over a macOS-powered device
6 Oct 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
The Google Play Store application as shown on a smartphone display
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

Researchers identify three variations in the way the 'fleeceware' strain infects victims' Android devices
28 Sep 2020
Sophos Central Endpoint Protection review: Because you’re worth it
endpoint security

Sophos Central Endpoint Protection review: Because you’re worth it

It’s a tad pricey, but Sophos offers versatile user-based protection and the best mobile security around
3 Aug 2020