Articles
Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response
As evasive and complex as today’s threats have become, it’s no wonder security professionals in organizations of all sizes are ripping out their legacy antivirus completely in favor of Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) technologies. Endpoint Protection Pla…
Three Reasons to Upgrade Your Legacy AV/Endpoint Security
What technology do you remember the most from the ‘80s – ‘90s? Portable CD players? Floppy disks? 2G flip phones? None of these, of course, survived the digital evolution. Do you know which technology developed in that era that did survive? Legacy antivirus (AV). That’s right. While many other techn…
Threat Hunting for the Riskiest 1 Percent
How to hunt for threats with speed and precision “What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. That dreaded question can come as an urgent message on Sunday when you’re with your family, as a text at the crack o…
Threat Hunting for the Holidays
How to stop the ‘Grinch’ from breaking your endpoint defenses You’re gearing up for the holidays. But then your phone rings – it’s your manager. He just heard the news that another malware strain is on the loose. Just like the Grinch, it is a ‘mean one,’ posing a vicious threat to the security of co…
Demystifying: Cryptocurrency Mining Threats
How to protect your endpoints from “creepy crypto miners” Here’s what’s creepy about cryptocurrency mining threats. It can lead to the slow death of your computers – capable of literally melting smartphones in some cases – by overworking the CPU beyond its normal capacity. It can trigger massive spi…
1