Security News

Microsoft previews Linux endpoint detection and response capabilities
2020-11-17 14:02

Microsoft has announced today the public preview of endpoint detection and response capabilities on Linux servers running Microsoft Defender Advanced Threat Protection - now known as Microsoft Defender for Endpoint. "This builds on the existing preventative antivirus capabilities and centralized reporting available via the Microsoft Defender Security Center," Microsoft Senior Product Manager Tomer Hevlin said.

CoSoSys enhances Endpoint Protector 5.2.0.9 with enterprise features
2020-11-10 01:00

CoSoSys announces a main upgrade for Endpoint Protector, a multi-OS Data Loss Prevention solution for Windows, macOS, and Linux computers. The newest version, Endpoint Protector 5.2.0.9, brings essential functionalities that will help enterprises in industries such as financial services, healthcare, insurance, and law to protect data efficiently in the age of work-from-home.

The power of trusted endpoints
2020-11-05 06:00

They've been used for ages with great success and, as a result, make the concept of possession as a primary factor easy for users to understand: "Keep your keys safe, it grants you access." There was never a need to add an extra layer of authentication. After much experimenting with identification and endpoints, the iPhone can now act as a car key.

Action1 service now free for up to 10 endpoints
2020-11-03 01:00

Action1 announced that Action1 service is now free, without any functionality limitations, for up to 10 endpoints. The cloud service allows to implement remote support of at-home employees and enforce the same IT security standards as in office-based environments.

Sectigo partners with Green Hills to help manufacturers protect endpoint devices
2020-11-03 00:00

Sectigo and Green Hills Software announce a global reseller agreement. The agreement enables Green Hills Software to offer Sectigo's Icon LabsTM Embedded Firewall, integrated and optimized for use with Green Hills Software's INTEGRITY real-time operating system and its embedded high-performance TCP/IP v4/v6 host and router networking stack.

Microsoft Introduces Device Vulnerability Report in Defender for Endpoint
2020-10-29 16:01

Microsoft this week announced the availability of a new vulnerability management report in Microsoft Defender, to provide information on vulnerable devices. The new built-in report complements existing Microsoft Defender for Endpoint threat and vulnerability management capabilities and is catered for those looking to gain insights on devices that pose potential risks due to unpatched vulnerabilities.

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges
2020-10-22 00:15

Attivo Networks announced innovative enhancements to its ThreatPath solution, part of the modular ThreatDefend Endpoint Detection Net family of products. ThreatPath, which continuously observes and shows credential exposures, now also provides organizations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts.

Week in review: Criminals leveraging Office 365, endpoint attack anatomy, medical devices cybersec
2020-10-18 08:12

The anatomy of an endpoint attackA lot has changed across the cybersecurity threat landscape in the last decade, but one thing has remained the same: the endpoint is under siege. Cybercriminals are using legitimate Office 365 services to launch attacksVectra released its report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks.

Absolute Control mobile app helps secure endpoint devices and protect sensitive data on the go
2020-10-15 02:15

Absolute announced the launch of its new Absolute Control mobile app, designed to help customers secure endpoint devices and protect sensitive data while on the go. The user-friendly app extends the power of the Absolute console, enabling IT and Security teams to easily locate lost or stolen devices, check the health of critical endpoint security agents, and take swift action to lock a device if it is determined to be at risk.

The anatomy of an endpoint attack
2020-10-12 04:30

Take the massive Norsk Hydro ransomware attack as an example: The initial infection occurred three months prior to the attacker executing the ransomware and locking down much of the manufacturer's computer systems. What exactly are attackers doing with that time? How do they make their way onto the endpoint undetected?