Home Tags Endpoint protection

Tag: endpoint protection

Unleashing XDR to Transform Enterprise Threat Detection and Response

0
Have you ever wondered why during the outbreak of war, it’s not just one of the armed forces that’s deployed — Army, Navy, Air...

Agent Tesla RAT Upgrades Itself with New Delivery and Evasion Techniques

0
Malware is often on the lookout for newer ways to sneak and evade security. One such malware is Agent Tesla. It is an information...

Endpoint Security is a Lot More Than Just Technology: Gartner

0
Speaking to CISO MAG, Prateek Bhajanka, Senior Principal Analyst, Gartner explains why endpoints have suddenly become so important in the realm of enterprise network...

McAfee’s Latest SaaS-based Suite Delivers Unified Cybersecurity Solution

0
McAfee, a cybersecurity company providing device-to-cloud solutions, has extended its MVISION product’s portfolio and now extends cybersecurity for all – endpoints, web, and cloud....

Palo Alto Networks to Acquire Incident Response Firm Crypsis Group

0
Cybersecurity firm Palo Alto Networks entered into an acquisition agreement  with risk management and digital forensics consulting firm Crypsis Group in a proposed deal...

CrowdStrike Report Reveals Telecommunications Industry Attacks on the Rise

0
CrowdStrike Inc. the developer of cloud-delivered endpoint protection solutions, announced the release of the 2020 CrowdStrike Global Threat Report. Findings from the report indicate...

SentinelOne Raises US$200 Million for Next-Gen Endpoint Protection

0
Endpoint protection firm SentinelOne announced that it raised US$200 million in Series E funding led by private equity firm Insight Partners along with the...

The Remote of Your Smart TV Could be in Hackers’ Hand!

0
Often dubbed as an idiot box, the television is no longer just a dumb gadget. It’s become smart, and is growing smarter, in-line to...

CISO MAG study: 1 in 3 CISOs feel biggest challenge of...

0
November 21, 2019: Today, the typical organization has hundreds if not thousands of endpoints: desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams,...

“Automation can help us by making sure our recovery environment replicates...

0
Security leaders are grappling with a number of challenges today but with more automation coming into cybersecurity, they are seeing some solutions to ease...

MOST POPULAR

RECENT POSTS