Security News

Sectigo partners with Green Hills to help manufacturers protect endpoint devices
2020-11-03 00:00

Sectigo and Green Hills Software announce a global reseller agreement. The agreement enables Green Hills Software to offer Sectigo's Icon LabsTM Embedded Firewall, integrated and optimized for use with Green Hills Software's INTEGRITY real-time operating system and its embedded high-performance TCP/IP v4/v6 host and router networking stack.

Microsoft Introduces Device Vulnerability Report in Defender for Endpoint
2020-10-29 16:01

Microsoft this week announced the availability of a new vulnerability management report in Microsoft Defender, to provide information on vulnerable devices. The new built-in report complements existing Microsoft Defender for Endpoint threat and vulnerability management capabilities and is catered for those looking to gain insights on devices that pose potential risks due to unpatched vulnerabilities.

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges
2020-10-22 00:15

Attivo Networks announced innovative enhancements to its ThreatPath solution, part of the modular ThreatDefend Endpoint Detection Net family of products. ThreatPath, which continuously observes and shows credential exposures, now also provides organizations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts.

Week in review: Criminals leveraging Office 365, endpoint attack anatomy, medical devices cybersec
2020-10-18 08:12

The anatomy of an endpoint attackA lot has changed across the cybersecurity threat landscape in the last decade, but one thing has remained the same: the endpoint is under siege. Cybercriminals are using legitimate Office 365 services to launch attacksVectra released its report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks.

Absolute Control mobile app helps secure endpoint devices and protect sensitive data on the go
2020-10-15 02:15

Absolute announced the launch of its new Absolute Control mobile app, designed to help customers secure endpoint devices and protect sensitive data while on the go. The user-friendly app extends the power of the Absolute console, enabling IT and Security teams to easily locate lost or stolen devices, check the health of critical endpoint security agents, and take swift action to lock a device if it is determined to be at risk.

The anatomy of an endpoint attack
2020-10-12 04:30

Take the massive Norsk Hydro ransomware attack as an example: The initial infection occurred three months prior to the attacker executing the ransomware and locking down much of the manufacturer's computer systems. What exactly are attackers doing with that time? How do they make their way onto the endpoint undetected?

BlackBerry announces "industry first" AI-powered unified endpoint security platform
2020-10-06 14:13

BlackBerry has announced a new cybersecurity product that it says is the industry's first AI-powered unified endpoint security system. BlackBerry Cyber Suite consists of four tools that BlackBerry said makes it a preventative security tool, rather than just a detect-and-respond one.

Ivanti acquires MobileIron and Pulse Secure to further automate and secure endpoints
2020-09-28 22:30

Ivanti announced it has signed definitive agreements to acquire MobileIron and Pulse Secure. With the announced transactions, Ivanti will enable customers to discover, manage, secure service, and automate across all device types with the Ivanti Neurons hyper-automation platform.

Using virtualization to isolate risky applications and other endpoint threats
2020-09-25 05:00

Microsoft Defender Application Guard, brings hypervisor-based isolation to Microsoft Edge and Microsoft Office applications. While Application Guard works well with Edge and Office, it doesn't support other applications.

Qualys Multi-Vector EDR: Providing infosec teams with actionable visibility into their endpoints
2020-09-23 02:30

Qualys announced the immediate availability of Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response, Qualys now brings the unified power of its highly scalable cloud platform to EDR. "Qualys Multi-Vector EDR provides our Infosec team with actionable visibility into our endpoints in terms of detecting malicious hashes provided by intelligent agencies as well as detecting potential malicious attacks through authorized processes, to keep our company assets secure." "Unfortunately, not all organizations have such a focus. Nevertheless, weaving in threat intelligence enables Qualys to combine in-house context and vulnerability management-driven prioritization with external context, representing an opportunity to achieve something greater than the majority of the market to date," said Mark Child, research manager, European Security, IDC. "We are proud to deliver Multi-Vector EDR to customers and extend into the detection and response market," said Philippe Courtot, chairman and CEO of Qualys.