Blog Posts Tagged with "Endpoint Security"

798062984af63011823d48fef7863cd8

What to do When Traditional Security Isn’t Enough

June 25, 2013 Added by:Paul Lipman

Relying on traditional security measures to catch the bad guy in action or prevent being the victim of a breach doesn’t cut it in today’s threat landscape, and IT teams don’t have the time and resources to address each threat vector in isolation, nor should they have to.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Complimentary IT Security Resources [May 13, 2013]

May 13, 2013 Added by:InfosecIsland News

As an Infosec Island reader, we are pleased to offer you the following complimentary IT security resources for the week of May 13, 2013.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Three Keys to Managing Firewalls for Better Security

September 25, 2012 Added by:Richard Stiennon

The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...

Comments  (1)

296634767383f056e82787fcb3b94864

The 2006 Theft of Symantec's Source Code - Response and Repercussions

January 26, 2012 Added by:Jeffrey Carr

Symantec has acknowledged that source code for multiple products was stolen in 2006. The worst part is that Symantec was clueless about the theft of its own source code for almost six years, which means that thousands of customers were clueless as well...

Comments  (1)

34f0cf280cbc950bcb75cabd189b7a8d

Remote Management as a Complement to Endpoint Security

October 31, 2011 Added by:Kanguru Solutions

Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

E2E Encryption and Doctored Credit Card Terminals

May 26, 2011 Added by:PCI Guru

End-to-end encryption just moves the attack points, in this case out to the terminal at the merchant’s location. Worse yet, it also makes security of the merchant’s endpoint even more difficult than it already is because the techniques used in doctoring terminals can easily go unnoticed...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Convenience or Security?

May 19, 2011 Added by:Emmett Jorgensen

Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Evolution of Endpoint Attacks

February 22, 2011 Added by:Don Eijndhoven

Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...

Comments  (3)