Endpoint Security News, Articles and Updates

Malwarebytes acquires Romanian start up Binisoft

Malwarebytes has acquired the privately held Romanian-based security firm Binisoft as part of an overall effort to boost Malwarebytes ability to enhance endpoint security.

£12m pa - the hidden costs of maintaining endpoint security solutions

Enterprises across the globe are now investing heavily in licensing and deployment of endpoint security solutions to protect their IT systems but fail to spot hidden costs of human skills and effort required.

Endpoint security software market valued at £4.6 bn by 2021

The endpoint security software market is forecast to grow at a 4.5 percent annually over the next five years, reaching £4.6 billion by 2021 according to Forrester research.

"You are only as strong as your weakest link" - How can MSPs and SMEs improve their endpoint security

Mike Puglia looks at the difficulties managed service providers and small businesses have to confront in protecting their IT systems and how they can best use technology to overcome these obstacles.

Corporate data on endpoint devices more vulnerable to cyber-threats

Code42's latest report says CIOs, CISOs and their IT security teams need to find powerful new solutions that will keep data safe without impeding productivity and causing further risk.

Hong Kong breach underlines need for all endpoints to be self-healing

Richard Henderson discusses the implications of a breach and the importance of businesses having persistent insight into all endpoints.

When CNI attacks go mainstream: the case for improving endpoint security

Chris Goettl discusses how IT security and service desk teams should improve collaboration and how organisations can take a more considered approach to asset management and endpoint security.

Fighting new cyber-threats the 'old-fashioned' way doesn't work

Shai Morag discusses the importance of endpoint visibility for a large organisation, what stands in the way of organisations maturing their endpoint visibility and ways technology can help ascertain this essential missing piece of the incident response puzzle.

A synchronised approach to security

Without synchronised security, information system controls don't talk to each other, so can't work together to react to threats says John Shaw, advocating a more joined-up approach to security to defend against attacks.

Macs aren't immune to hacks

Following a spate of Apple-specific vulnerabilities, James Maude warns that CIOs need to be wary of their Mac footprint