- August 19, 2016
Dell's Brett Hansen explains why machine learning security is better than signature-based detection and how it can stop emerging threats.
- April 01, 2016
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.
- January 29, 2016
Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works.
- March 21, 2014
Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.
- January 16, 2014
Software giant Microsoft will extend Windows XP antivirus updates past the XP end-of-life date, but security patches are still slated to end in April.
- September 20, 2013
HP's new SureStart feature detects and 'heals' corrupted BIOS code.
- August 28, 2013
U.S.-based CounterTack in agreement to protect South Korean security firm SK Infosec's endpoints from increasingly stealthy cyberattacks.
- March 14, 2013
Secunia highlights the growing need for better third-party application security, plus Microsoft's security improvements, and the growing cost of zero-days.
- December 17, 2012
Blue Coat said Crossbeam gives it a platform for its software and also helps bolster its network optimization strategy in high-end data centers.
- December 04, 2012
Symantec joins other security firms in supporting VMware vShield Endpoint in a bid to reduce the problem of AV storms.
- November 27, 2012
Slow updates to signature databases cause some antivirus products to be ineffective against known threats, according to a study by security firm Imperva.
- September 17, 2012
The popularity of Malwarebytes Anti-Malware for consumers paved the way for a business version
- March 12, 2012
An analysis of installed endpoint security applications found Avast with a strong lead in the global antivirus market, followed by Avira, AVG, Microsoft and ESET.
- February 13, 2012
Attackers are finding an easy way into corporate networks often by targeting remote management weaknesses. Poorly configured software can lead to a data security breach.
- November 30, 2011
Researchers at Columbia University have discovered a vulnerability in HP’s LaserJet printers that could allow attackers to gain complete remote control.