Illumio Endpoint prevents breaches from spreading across endpoints
Illumio announced Illumio Endpoint, a reimagined way to prevent breaches from spreading to clouds and data centers from laptops. Hybrid work has expanded the attack surface, introducing new threats and making organizations more vulnerable, so it’s.....»»
ControlUp Secure DX reduces endpoint management complexity
ControlUp announced Secure DX, a real-time scanning, detection, and remediation solution that improves the security posture of endpoint devices without compromising the digital employee experience. By continuously and autonomously spotting and resolv.....»»
DataDome Account Protect provides security for login and registration endpoints
DataDome launched DataDome Account Protect. This solution targets the growing threat of account takeovers and fake account creations that organizations worldwide face, providing robust security for login and registration endpoints against account-bas.....»»
eSentire Threat Intelligence reduces false positive alerts
eSentire launched its first standalone cybersecurity product, eSentire Threat Intelligence, extending eSentire’s protection and automated blocking capability across firewalls, threat intelligence platforms, email services and endpoint agents. eSent.....»»
Apple-backed Product Security Verified label will confirm smart home devices are secure
A new Product Security Verified (PSV) label will in future be used to identify smart home devices which meet new industry standards designed to protect against hacking and data breaches. It’s the latest initiative by the industry alliance behind.....»»
Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788)
A recently fixed SQL injection vulnerability (CVE-2023-48788) in Fortinet’s FortiClient Endpoint Management Server (EMS) solution has apparently piqued the interest of many: Horizon3’s Attack Team means to publish technical details and a.....»»
Only 13% of medical devices support endpoint protection agents
63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, acc.....»»
Trellix secures sensitive and proprietary information with new protections for macOS
Trellix announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional exposure. Global organizations can now protect against critical data leakage.....»»
The most concerning risks for 2024 and beyond
In this Help Net Security video, Melissa Bischoping, Director, Endpoint Security Research at Tanium, discusses the most concerning risks for 2024 and beyond, from both an internal and external perspective. The post The most concerning risks for 2024.....»»
Cynerio extends Healthcare Cybersecurity Platform to improve patient data protections
As data breaches continue to expose sensitive healthcare information, with over 118 million patients impacted in the United States in 2023, Cynerio has extended its commitment to enhancing cybersecurity in the healthcare sector. With a focus on addre.....»»
Quantum imaging could create bright future for advanced microscopes
The unique properties of quantum physics could help solve a longstanding problem that prevents microscopes from producing sharper images at the smallest scales, researchers say......»»
Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which (CVE-2024-20337) could be exploited by unauthenticated, remote attackers to grab users’ valid SAML a.....»»
Today’s biggest AI security challenges
98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science leaders to.....»»
Bitdefender releases GravityZone Cloud MSP Security Solutions
Bitdefender launched GravityZone Cloud MSP Security Solutions, a new offering designed specifically for managed service providers (MSPs) and their business customers that delivers endpoint protection and managed detection and response (MDR) services.....»»
Less Sea Ice Means More Arctic Trees—Which Means Trouble
White spruce are spreading in the high north, thanks to extra snow. That “Arctic greening” has serious climate implications......»»
Newly discovered protein prevents DNA triplication
Every time a cell divides, its DNA is duplicated so that the two daughter cells have the same genetic material as their parent. This means that, millions of times a day, a biochemical wonder takes place in the body: the copying of the DNA molecule. I.....»»
98% of businesses linked to breached third parties
According to the updated SEC regulations on cybersecurity incident disclosure, findings by SecurityScorecard reveal that 98% of companies are associated with a third party that has experienced a breach. It often takes months or longer for breaches to.....»»
New infosec products of the week: March 1, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Legato Security, Exabeam, Spin.AI, and Viavi Solutions. Legato Security Ensemble helps organizations prevent breaches Ensemble addresses the challenges busin.....»»
Most data breaches on enterprise attack the supply chain
Cl0p, with its MOVEit campaign, is still making headlines......»»
Legato Security Ensemble helps organizations prevent breaches
Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats. Ensemble empowers organizations to optimize their security investments by unifying threat detection.....»»
Ransomware associated with LockBit still spreading 2 days after server takedown
LockBit's extensive reach is making complete erasure hard. Enlarge (credit: Getty Images) Two days after an international team of authorities struck a major blow at LockBit, one of the Internet’s most prolific ransomwa.....»»