According to the 2018 IBM X-Force Threat Intelligence Index, the frequency and sophistication of malicious cryptocurrency mining, also called “cryptojacking,” has increased drastically in the past year. This mining is changing malicious actors’ priorities: While they had previously targeted companies’ data and financial assets, they are now seeking to extract value from organizations’ computing resources….

As the workforce becomes increasingly mobile, organizations must adapt their security strategies to account for the enlarged threat surface. While mobility undeniably helps organizations boost productivity, it also creates considerable weaknesses in the IT environment. How can companies strike a balance between giving employees the 24/7 access they need to perform their jobs and protecting…

Defense-in-depth is a common security strategy that often includes a combination of endpoint security products, including next generation anti-virus (NGAV), traditional anti-virus (AV) and/or endpoint detection and response (EDR). But as attacks and breaches continue to surge, I can’t help but wonder: are these technologies missing the point?  The CyberArk Endpoint Privilege Manager and products…

While nobody has a crystal ball for what’s coming this year, I think we can all agree tough security lessons were learned in 2017. From Yahoo indicating that every one of its 3 Billion email accounts (that’s a B) was exposed in a breach to some pretty serious hacking tools believed to have been developed…

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise assets. With this…

 FireEye Announces Exploit Prevention and Anti-Virus Replacement for the Endpoint

MILPITAS, Calif. – February 15, 2017 – FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced several enhancements to its endpoint security solution designed to offer unparalleled protection from threats missed by legacy and next-generation endpoint solutions. Utilizing the behavioral analysis capabilities of Exploit Guard, Endpoint Security now adds the prevention capabilities needed to…

Every business, large or small, must be able to remediate vulnerabilities that can threaten to undermine all its hard work and success. The security analysts and IT operators at these organizations have surely heard of household-name vulnerabilities like Heartbleed and Shellshock. But do they have all the knowledge and tools they need to track and…

 Symantec Selects VMware AirWatch to Build Enhanced Endpoint Security Integrations

ATLANTA – October 5, 2016 – Today at Connect 2016, Symantec a global leader in cyber security, and VMware (NYSE: VMW) a global leader in cloud infrastructure and business mobility, announced the development of a strategic partnership to bring together endpoint management and threat security where Symantec joins the VMware Mobile Security Alliance. Effective cyber…

 Expanded Carbon Black and IBM Partnership Delivers New Technology to Identify and Patch Most Critical Endpoint Vulnerabilities in Seconds

WALTHAM, MA – October 4, 2016 — Carbon Black, the leader in next-generation endpoint security, today announced an expansion of its partnership with IBM Security [NYSE: IBM].  The companies have collaborated to deliver a unique technology, which empowers customers to patch, within seconds, the most pervasive and critical vulnerabilities affecting an enterprise’s security. IBM will…