Security Technology: Next-Gen Endpoint Protection

Week two of Cyber Security Awareness Month is among us and this week our focus is on Security Technologies and knowing what it takes to keep our organizations safe. Today we will discuss Next-Generation Endpoint Protection and what “Next-Gen” means for security in todays landscape. Why Is Technology Awareness Important? Knowing what technology is out there, what controls are needed to address the current and emerging threat landscape, and how they work...

Read More

Emergency Enablement for Remote Work: Endpoint Protection Edition

By: Joel Young We are currently navigating unprecedented times of a global pandemic, but as the World Health Organization's announcement on March 11th emphasizes, for the first time in history it is also one we may be able to control if impacted nations' responses are swift and effectively implemented. A key factor in this fight is the use of big data analytics, which we are seeing used as a weapon against disease on this scale for the first time. We are watching the live tracking of cases across the...

Read More
Attention Holiday Shoppers! 5 Tips To Beat Seasonal Cybercriminals

Attention Holiday Shoppers! 5 Tips To Beat Seasonal Cybercriminals

The festive spirit isn’t the only thing that’s infectious as the 2018 holiday season approaches. It’s typically the time of year when we see an uptick in cyber theft. With online spending expected to increase 14.8% compared to 2017, representing a huge $124.1 billion of internet commerce, it’s a mouth-watering proposition for criminals. With retailers swamping inboxes with millions of promotional emails, and hungry shoppers desperately looking for great buys, it’s the perfect time...

Read More

How Fileless Malware Changes The Way We Treat Cyber Threats

Traditionally, AV and other endpoint security products have focused on files (executables) to detect and prevent malware. There are several advantages to this. Files can be hashed, queried in reputation services, examined by both static analysis and machine learning, and easily excluded for false detections. These advantages lead to a problem for attackers. The name of the game is monetary gain: threat actors aim for cost-effectiveness, seeking the highest return for the...

Read More

Begin With the End(point) in Mind

Advances in artificial intelligence (AI), machine learning (ML), and mathematical algorithms have allowed cyber security professionals to bolster their threat prevention in recent years. SecOps groups have shifted focus from response to prevention, using AI/ML-powered protection products such as CylancePROTECT® to stop malicious threats before they execute. By actually preventing attacks, CylancePROTECT allows SecOps teams to achieve an expanding ripple effect of benefits. Increased visibility into corporate systems, reduced (or eliminated) data loss...

Read More