Endpoint

Microsoft Convenes Endpoint Security Firms Following CrowdStrike Incident

Microsoft Convenes Endpoint Security Firms Following CrowdStrike Incident 2024-08-27 at 16:31 By Eduard Kovacs Microsoft has called together cybersecurity firms and government representatives for its Windows Endpoint Security Ecosystem Summit. The post Microsoft Convenes Endpoint Security Firms Following CrowdStrike Incident appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original […]

React to this headline:

Loading spinner

Microsoft Convenes Endpoint Security Firms Following CrowdStrike Incident Read More »

New Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level

New Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level 2024-05-29 at 15:16 By Kevin Townsend The two primary components to the solution are to encrypt company data at all times, and to decrypt only when the file is required for use. The post New Endpoint Protection Platform by Cigent Blocks Ransomware at

React to this headline:

Loading spinner

New Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level Read More »

Endpoint Security Firm ThreatLocker Raises $115 Million in Series D Funding

Endpoint Security Firm ThreatLocker Raises $115 Million in Series D Funding 2024-04-25 at 15:17 By Eduard Kovacs Zero trust endpoint security company ThreatLocker has announced a $115 million Series D funding round that brings the total to $240 million.  The post Endpoint Security Firm ThreatLocker Raises $115 Million in Series D Funding appeared first on

React to this headline:

Loading spinner

Endpoint Security Firm ThreatLocker Raises $115 Million in Series D Funding Read More »

Research Shows How Attackers Can Abuse EDR Security Products

Research Shows How Attackers Can Abuse EDR Security Products 2024-04-22 at 17:46 By Ionut Arghire Vulnerabilities in Palo Alto Networks Cortex XDR allowed a security researcher to turn it into a malicious offensive tool. The post Research Shows How Attackers Can Abuse EDR Security Products appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Research Shows How Attackers Can Abuse EDR Security Products Read More »

Is XDR Enough? The Hidden Gaps in Your Security Net

Is XDR Enough? The Hidden Gaps in Your Security Net 2024-02-28 at 14:52 By Etay Maor When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times. The post Is XDR Enough? The Hidden Gaps in Your Security Net appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Is XDR Enough? The Hidden Gaps in Your Security Net Read More »

New ‘Pool Party’ Process Injection Techniques Undetected by EDR Solutions

New ‘Pool Party’ Process Injection Techniques Undetected by EDR Solutions 07/12/2023 at 17:01 By Ionut Arghire Pool Party is a new set of eight Windows process injection techniques that evade endpoint detection and response solutions. The post New ‘Pool Party’ Process Injection Techniques Undetected by EDR Solutions appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New ‘Pool Party’ Process Injection Techniques Undetected by EDR Solutions Read More »

Lost and Stolen Devices: A Gateway to Data Breaches and Leaks

Lost and Stolen Devices: A Gateway to Data Breaches and Leaks 18/10/2023 at 15:49 By Torsten George By implementing strong security practices,, organizations can significantly reduce the risks associated with lost and stolen computers and safeguard their sensitive information. The post Lost and Stolen Devices: A Gateway to Data Breaches and Leaks appeared first on

React to this headline:

Loading spinner

Lost and Stolen Devices: A Gateway to Data Breaches and Leaks Read More »

Scroll to Top