Endpoint

The latest best practices and technologies for securing endpoints.

  • CrowdStrike vs Symantec: Top EDR Solutions Compared

    Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product list, they’re very different security products that will likely appeal to buyers with different goals in mind. Here’s a look at both EDR products, how they compare, and their ideal…


  • How Machine Identities Can Imperil Enterprise Security

    Managing machine identities has never been more critical to an enterprise’s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper management of machine-to-machine communications, all those machines can become a huge security issue. Gartner’s list of the top security risks and trends…


  • Windows 11 Security Features & Requirements

    Windows 11 started rolling out on October 5 for personal devices, but most businesses are unlikely to get access to the upgrade until the middle of 2022. Regardless of when you get Windows 11, you’ll need to know what security features are included and available, so you can effectively implement it across your organization. The…


  • NSA, CISA Release Guidance for Choosing and Hardening VPNs

    The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network (VPN) solutions. VPNs, an important security tool in an era of widespread remote work, are entry points into secured networks that bad attackers frequently try to use in malicious assaults. Because…


  • Securing Home Employees with Enterprise-Class Solutions

    The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when things return to normal. Remote work poses unique risks not addressed by traditional corporate network security, so it’s only natural that enterprise security vendors have been targeting work-at-home employees with more…


  • Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

    A pair of vulnerabilities in the Linux kernel disclosed this week expose major Linux operating systems that could let a hacker either gain root privileges on a compromised host or shut down the entire OS altogether. The two flaws – CVE-2021-33909 and CVE-2021-33910, respectively – were disclosed by vulnerability management vendor Qualys in a pair…


  • Microsoft Security Under Scrutiny After Recent Incidents

    Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed “PrintNightmare.” Sangfor had published the exploit code,…


  • FireEye, Mandiant to Split in $1.2 Billion Deal

    FireEye is selling its core cybersecurity products to a group led by private equity firm Symphony Technology Group (STG) in order to focus on its Mandiant threat response and services business. FireEye’s products span network, email, endpoint and cloud security, and the vendor has been pursuing an XDR platform approach to unite them all. The…


  • MITRE Protection Tests Shed New Light on Endpoint Security

    MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products’ ability to stop an adversarial attack. Previous MITRE evaluations and the first part of the latest evaluation, Carbanak+FIN7, focused on the ability of vendors to detect attacks and alert security staff. That detection approach focuses…


  • Bitdefender Review: EDR and Antivirus Security Solutions

    Enterprise antivirus software helps keep confidential enterprise data as secure as possible. Malicious actors try to take advantage of penetrable cybersecurity measures and gullible employees to gain access to enterprise networks. Once malware infects a device in an enterprise network, the virus can spread to other computers on the same network and create havoc by…


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis