Gilad Maayan

Endpoint Detection and Response: Securing Your Borders

The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI ...

Strong Authentication for Endpoint Security: 3 Perspectives

Authentication solutions have been around for years. I actually started my cyber career working on one of the original and best two-factor (2FA) products – SecurID. Over the decades, the tech we ...
Kaspersky

Busted: Kaspersky AV Tracks Your Every Click

Kaspersky Lab’s endpoint security products track your web activity. And it allowed any other website to track you ...
Security Boulevard

Endpoint Security: It’s a Whole New World

Once upon a time, endpoint security was just a hall monitor. It watched for known bad files identified with a simple signature and sent you an alert when the file was blocked ...

Our 2018 Update for “Endpoint Detection and Response Architecture and Operations Practices” Publishes

| | EDR, endpoint, security
Our main EDR document (“Endpoint Detection and Response Architecture and Operations Practices”) was just updated by Jon Amato, and it looks much better now. The abstract states “’Increasing complexity and frequency of ...

Cybersecurity: Protecting All the Endpoints

Network security is an issue that is increasingly important as businesses and even households shift more workflow processes and key tasks to the network and into the cloud. While some users may ...
Loading...