endpoint security

Endpoint Security the Foundation to Cybersecurity

The growing threat landscape requires endpoint security be the cornerstone of any enterprise security strategy Ransomware attacks continue to loom large as a threat and cybercriminals are evolving ever-sophisticated approaches to target ...
Security Boulevard
SD-WAN

Survey: Enterprises Losing Confidence in SD-WAN Security

A recent survey commissioned by CATO Networks reveals that enterprises that deployed SD-WANs were less confident in their networks after undergoing digital transformation. The survey polled 1,333 IT professionals worldwide and provided ...
Security Boulevard

A Look Forward to 2020 and a New Decade of Cybersecurity Threats

Cybersecurity has become a chess match (albeit a fast-paced version) between enterprises and online criminals as they to try to out-maneuver one another. Staying up to date on the latest cyber threats ...

Why You Need a Software Bill of Materials More Than Ever

Imagine that a new vulnerability in lodash was just announced. Applications using the npm package are being exploited through large scale automated DoS attacks. You need to act quickly to understand if ...
Inside The First Amazon Go Store

Facial recognition technology benefits: much more than unlocking smartphones

Facial recognition is no longer limited to security and authentication. Here, we look at other instances where facial recognition is bringing benefits to the community ...
Face/Off: Security challenges in the age of facial recognition

Face/Off: Security challenges in the age of facial recognition

Facial recognition faces its share of security threats but with constant evolution in the technology, it’s rapidly fighting back against these flaws ...

For Caught in the Crossfire of Cyberwarfare

Authored by Dr Sandra Bell, Head of Resilience Consulting EMEA, Sungard Availability Services PDF edition of this articleThe 2019 National Cyber Security Centre’s (NCSC) Annual Review does not shy away from naming ...
Debunking The BlueKeep Exploit Hype – What You Should Know

Debunking The BlueKeep Exploit Hype – What You Should Know

WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to ...

New in 2019.10: Updated Command Line Scanner

| | Emsisoft News, enterprise security
We have slightly changed the behavior of the standalone package of Emsisoft Commandline Scanner in the most recent update. The post New in 2019.10: Updated Command Line Scanner appeared first on Emsisoft ...
zero trust

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Security Boulevard