Endpoint Security

Endpoint security news, trends, analysis and practical advice

bubble man data shield attack binary code
tools preventing data leaks 1

endpoint protection 1

10 advanced endpoint protection tools

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule...

goalie protection save 2

How to buy endpoint security products

While there is no single endpoint security product that can suit all situations, endpoint configurations and IT requirements, there are a few key things to consider in your purchase.

authentication

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage,...

complex network

Three reasons you should care about technology asset management

After the recent discovery that a restaurant i frequented was processing my credit card on WIndows XP, I was reminded of the importance of technology asset management, for both hardware and software. It seems that many organizations...

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office .

endpoint security

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known...

female executive keyhole security

Here's what happens when you drop 200 USB sticks in public

It would be logical to assume that people know the risks around cybersecurity. A recent experiment challenges that assumption.

cancelling an it project

Intel Security to discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

credit cards

Feud heats up over chip cards, FBI warning

A National Retail Federation attorney said that an updated FBI warning on chip card vulnerabilities waters down the need for PIN security.

spam 000005468488

Google fine-tunes spam-catching tools

Google reduced spam reaching inboxes to a fraction of a percent, but in the process sometimes misclassifies bulk-mailed messages like monthly statements and ticket receipts.

How to use a smart chip card

Some users will 'kick and scream' at paying with slower chip cards

Major U.S. banks have been rolling out new, secure smart chip debit and credit cards for months, but the real end-user impact hasn't yet been felt.

Internet cyber security

Web app attacks, PoS intrusions and cyberespionage top causes of data breaches

Web application attacks, point-of-sale intrusions, cyberespionage and crimeware were the leading causes of confirmed data breaches last year.

encryption

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.

countdown

Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Free and cheap ways to learn about IT security

Free and cheap ways to learn about IT security

From recovering deleted files to setting up an intrusion detection system, these seven projects give you hands-on experience with an array of security tasks.

snowden

Link between NSA and Regin cyberespionage malware becomes clearer

Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for...

Load More