Endpoint Security

Overcoming security alert fatigue

Alert fatigue represents more than a mere inconvenience for Security Operations Centre (SOC) teams; it poses a tangible threat to enterprise security. When analysts confront a deluge of thousands of alerts daily, each necessitating triage, investigation, and correlation, valuable time is easily squandered on false positives, potentially overlooking genuine indicators of an enterprise-wide data breach. […]

A simple guidance on obtaining effective endpoint security

Endpoint Security means securing the endpoints connected to/in a network. And here’s a general guide on how to implement endpoint security in true meaning: 1. Assessment and Planning: Assess your organization’s security needs, considering the types of devices used and potential threats. Develop a comprehensive security policy that includes endpoint protection. 2. Selecting Endpoint Security […]

Cygilant and SentinelOne Partnership Offers Businesses Automated Cybersecurity for the Endpoint and Cloud

Cybersecurity-as-a-Service Firm Offers Mid-Size Businesses Access to Leading Autonomous Cybersecurity Platform January 26, 2021 — Cygilant, provider of Cybersecurity-as-a-Service to mid-sized organizations, today announced its customers now have access to SentinelOne, the only cybersecurity solution encompassing AI-powered prevention, detection, response, and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform. Offered as part of […]

Nyotron PARANOID Blocks 100% of Unknown Threats During Rigorous ICSA Labs Testing

Deploying traditional security solutions like antivirus and firewall (whether next gen or not) that only attempt to detect new malware based on the past knowledge (e.g., previous malware samples and techniques) may have been sufficient in the 1990s, but not today. More and more organizations worldwide are falling victim to targeted attacks and suffering devastating […]

Shallow Defense In Depth

Are More Security Controls Really Making You More Secure? The average enterprise uses 75 security products just to secure their network. Organizations mistakenly believe that layered security controls help them achieve a defense-in-depth strategy that will keep their systems safe. They think that when an attack breaches one control, another one will certainly fend off […]

The Long Life of Zero Day and Its Implication

A zero day is an attack that exploits a previously unknown security vulnerability. The creation and distribution of zero days by cybercriminals is on the rise with 45 new ones already discovered in Q1 2018. According to a recent report from RAND Corporation called Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits, […]

A New Perspective on Endpoint Security

Here’s a short recap of one of the more interesting observations by Nyotron’s CTO Nir Gaist during a recent Down the Security Rabbit Hole Podcast on endpoint security. He argues that security hasn’t really changed in over 30 years! Most, including Gaist, acknowledge that next-generation antivirus (NGAV), which uses techniques such as artificial intelligence (AI) […]

The Evolution of Endpoint Security

Malware is winning… “Sometime around 1992 the amount of Badness in the Internet began to vastly outweigh the amount of Goodness.”1 Endpoint security is constantly changing with the malware landscape, but has had a lot of challenges keeping up with unknown threats. Here’s a quick overview of how endpoint protection has evolved from traditional antivirus […]

Actor Ashton Kutcher Firm backs SentinelOne $70 million Cyber Security Funding

SentinelOne, a cyber security startup which offers products & services having the capability to detect suspicious behavior on devices operating in corporate environments has received a  $70 million Series-C funding from high profile investors. The investor’s list includes companies like Third Point Ventures, Data Collective, Granite Hill Capital Partners, Westly Group, and SineWave Ventures. The […]

UX Design: An Overlooked Aspect of Endpoint Security

People in information security know to heed the advice of Bruce Schneier. What we often forget to do, however, is heed the advice of Don Norman, who is considered to be the father of User Experience design. In fact, when Apple hired Norman in 1993 as an Apple Fellow and User Experience Architect he was probably the […]

Share this page