Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
5G - How Will This Affect Your Organization?
What is it that connects Covent Garden in London, The Roman Baths in Bath and Los Angeles? The answer is 5G mobile communications used by media organizations. On January 29th I attended the 5G...
Learn more
Executive View
Executive View
Microsoft Entra Permissions Management
As organizations adopt multi cloud infrastructures to support business workflows involving user and workload identities it's increasingly difficult to know who has access to what data across which...
Learn more
Webinar Recording
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Learn more
Threat Detection and Incident Response
Blog
Threat Detection and Incident Response
Organizations and society in general have become more and more dependent on IT delivered services. This has increased the potential impact of risks from cyber-attacks. Cybersecurity needs to meet...
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Blog
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of...
Ransomware Attacks in a Protected Environment
Blog
Ransomware Attacks in a Protected Environment
Tune in to Florian Jörgens, CISO at Vorwerk discussing ransomware attacks and why networking is important to counter it.
Cyber Supply Chain Security
Blog
Cyber Supply Chain Security
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in...
State-sponsored Cyber Attacks
Blog
State-sponsored Cyber Attacks
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase...
Ransomware: The Invisible Enemy of Organizations
Blog
Ransomware: The Invisible Enemy of Organizations
The cost of cyberattacks is tremendous and affects every business and government around the world. So how can you become more resilient? Read on to find out.
Ransomware Attacks on Critical Infrastructure
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
PAM in a Post-Pandemic Digital World
Blog
PAM in a Post-Pandemic Digital World
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations...
NIS2 Directive: Who, What, and How?
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Endpoint Protection, Detection & Response
Blog
Endpoint Protection, Detection & Response
Cyber-attacks are continually evolving and so too is the approach organizations are taking to defend themselves, and nowhere is this more evident than in Endpoint Protection, Detection &...
Ransomware in 2022
Blog
Ransomware in 2022
The number of ransomware attacks has doubled in 2021. There's good reason to be concerned as a business. Read how you can protect your business now.
Log4j Vulnerability: It Is Still a Threat
Blog
Log4j Vulnerability: It Is Still a Threat
The Log4j vulnerability, was first detected in December 2021. Log4j is an open-source Java library that is widely used by developers to monitor apps and captures logs. Cybersecurity experts...
1 2 3 4 5 6 7 Next