Client security News
January 29, 2016
Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works.
August 28, 2015
News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise.
July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
March 21, 2014
Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.
Client security Get Started
Bring yourself up to speed with our introductory content
Phishing is a form of fraud in which the attacker tries to learn information -- such as login credentials or account information -- by masquerading as a reputable entity or person in email, IM, or other communication channels. Continue Reading
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy concerns to emerging threats. Continue Reading
Endpoint devices are often the root cause of data breaches. Expert Eric Cole explains the best ways to improve endpoint protection. Continue Reading
Evaluate Client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new Microsoft security feature takes aim at Windows 10 malware. Expert Michael Cobb explains what enterprises should know about Device Guard. Continue Reading
Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these ... Continue Reading
Cloud technologies often have a bad reputation when it comes to security, but that may be unfair. Is the cloud the best answer for securing the endpoints in your enterprise? Continue Reading
Manage Client security
Learn to apply best practices and optimize your operations.
While there’s a major focus on continuous endpoint monitoring and remediation today, security teams have to fight malware on all fronts. Continue Reading
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
Before investing in an endpoint security software product, be sure your enterprise asks itself these six critical questions. Continue Reading
Problem Solve Client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
Does the combination of the Trusted Platform Module and Windows 8 create the threat of a backdoor? Michael Cobb discusses. Continue Reading