To ensure the highest levels of endpoint security across more than 8,000 devices and to help achieve HIPAA compliance in the face of rising data breaches across the healthcare industry, Apria Healthcare leverages Absolute, the leader in endpoint resilience, for comprehensive endpoint visibility and control. Apria Healthcare serves nearly 2 million patients annually across 300…

What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware

The need to achieve responsible enterprise security has taken center stage in enterprise IT management in recent years, precipitated by a deluge of public data breaches that damaged company reputations. However, lacking information on the most critical modern attack vectors, many organizations continue to rely solely on traditional virus scanning tools as their sole method…

How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution of malware-related threats is like a sine wave movement, re-infused by new technology developments,” Christiaan Beek, Lead Scientist and Senior Principal Engineer, McAfee, told Help Net…

Data Security: Think Beyond the Endpoint

INTEROP 2019 – LAS VEGAS – Endpoint security is a common concern among organizations, but security teams should be thinking more broadly about protecting data wherever it resides. “If you’re just focusing on device protection and not data protection, you’re missing a lot,” said Shawn Anderson, executive security advisor for Microsoft’s Cybersecurity Solutions Group, at…

Think Data Security, Not Endpoint Security

INTEROP 2019 – LAS VEGAS – Endpoint security is a common concern among organizations, but security teams should be thinking more broadly about protecting data wherever it resides. “If you’re just focusing on device protection and not data protection, you’re missing a lot,” said Shawn Anderson, executive security advisor for Microsoft’s Cybersecurity Solutions Group, at…

What Are the Seven Biggest Social Media Scams of 2018?

The massive rise in popularity of social platforms has led to a huge upswing in social media scams — putting a growing pool of users at risk. Facebook had 2.23 billion monthly active users as of the second quarter of 2018, while photo-sharing site Instagram hit 1 billion monthly active users by June 2018, according…

Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking

According to the 2018 IBM X-Force Threat Intelligence Index, the frequency and sophistication of malicious cryptocurrency mining, also called “cryptojacking,” has increased drastically in the past year. This mining is changing malicious actors’ priorities: While they had previously targeted companies’ data and financial assets, they are now seeking to extract value from organizations’ computing resources….

The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?

As the workforce becomes increasingly mobile, organizations must adapt their security strategies to account for the enlarged threat surface. While mobility undeniably helps organizations boost productivity, it also creates considerable weaknesses in the IT environment. How can companies strike a balance between giving employees the 24/7 access they need to perform their jobs and protecting…

Where Are You Placing Your Endpoint Security Bets?

Defense-in-depth is a common security strategy that often includes a combination of endpoint security products, including next generation anti-virus (NGAV), traditional anti-virus (AV) and/or endpoint detection and response (EDR). But as attacks and breaches continue to surge, I can’t help but wonder: are these technologies missing the point?  The CyberArk Endpoint Privilege Manager and products…