#endpoint-security

[ follow ]
Information security
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP focuses on identifying, monitoring, and protecting sensitive data flows and storage, while EDR focuses on detecting, investigating, and responding to malicious endpoint behaviors and threats.
fromArs Technica
6 days ago

Unpacking Passkeys Pwned: Possibly the most specious research in decades

Malicious browser extensions can create attacker-controlled passkeys bound to legitimate domains, allowing account takeover and undermining the perceived theft immunity of passkeys.
Information security
fromThe Hacker News
1 week ago

AI-Driven Trends in Endpoint Security: What the 2025 Gartner Magic Quadrant Reveals

AI-powered, autonomous endpoint protection is essential to defend against growing, complex cyber threats and maintain operational continuity across diverse environments.
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP protects sensitive data and controls its movement; EDR detects, investigates, and responds to endpoint threats, reflecting distinct objectives and operational impacts.
Information security
fromTechzine Global
1 week ago

IGEL benefits from seismic VMware and Windows 10 shifts

IGEL's read-only OS and stateless endpoints reduce attack surface up to 95%, enabling centralized management, eliminating need for EDR/XDR, and extending zero trust to endpoints.
Information security
fromTechzine Global
2 weeks ago

Zscaler and CrowdStrike deepen SecOps collaboration

Zscaler and CrowdStrike deepened platform integration leveraging Red Canary's agentic AI to enhance endpoint security, improve threat detection, and shorten SecOps response times.
fromTheregister
2 weeks ago

Ransomware crews don't care about your EDR

At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on the market.
Information security
#cybersecurity
fromComputerworld
2 months ago
Information security

Hackers lean into social engineering to attack Apple security - Jamf

Update devices to the latest software and use strong passcodes for security.
Implement a layered approach to cybersecurity, focusing on endpoint security and adopting zero-trust principles.
fromBusiness Matters
3 months ago
Information security

Endpoint Security Management, SecOps Operations, and PKI

Endpoint security management is critical for organizations with numerous devices accessing their network.
A mediating Security Operations team can enhance collaboration and effectiveness in securing endpoints.
fromhackernoon.com
4 months ago

ConnArtist: Lightweight Endpoint Network Logger in PowerShell

ConnArtist is a streamlined, intuitive PowerShell script designed for monitoring network connections on a single endpoint, perfect for security checks and diagnostic tasks.
Node JS
[ Load more ]