Endpoint Protection

The rules of engagement for automating cyber-security

The rules of engagement for automating cyber-security

Kane Hardy explores how the rise of automated attacks dictates the need for automated defence.

Why Geofencing will become the next endpoint security innovation

Why Geofencing will become the next endpoint security innovation

Geofencing can restrict access to devices or applications while inside a company's perimeter, making it impossible for devices outside the perimeter to access the network explains Roman Foeckl

Multiple layers now required for effective security: report

Multiple layers now required for effective security: report

By

"The AV industry has evolved beyond static signature technology" says NSS Labs.

Think like an attacker:

Think like an attacker:

Protecting enterprise endpoints in a rapidly evolving threat landscape

Twitter malicious software attacks drag on

By

Despite ongoing efforts to address the problem, attacks based on exploiting Twitter's "trending topics" show no sign of abating, according to researchers at Panda Security.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US