Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here's what you need to know about memory-based attacks-and how to effectively protect against them.
With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.
Corporate economic concerns have put increased pressure on already limited IT resources in recent years as the onslaught of malware and sophistication of cyber attacks continues to grow at exponential rates. As a result, 50% of endpoint operating costs are directly attributable to malware, yet corporate IT budgets are still focused on maintaining stand alone antivirus as the keystone in endpoint security. In this paper, we will benchmark the effectiveness of standalone AV and O/S resident
Last year we offered our thoughts on buying Endpoint Security Management offerings - including patching, configuration, device control, and file integrity monitoring - which are increasingly bundled in suites to simplify management. In this updated and revised 2014 Endpoint Security Buyer's Guide we update our research on the management functions described last year and add coverage of antimalware, mobility, and BYOD. All very timely and relevant topics. The goal of this guide remains to provide
USB flash drives and other removable storage devices continue to proliferate throughout organizations. This could result in the loss or theft of your sensitive corporate and customer data, or in the propagation of malware like Stuxnet. Fortunately, powerful data protection tools are now available to help mitigate these risks, while still enabling flexible and managed use of these productivity devices. Learn about the best practices for deploying device control within your environment. Walk away
APTs have become a major topic of conversation ? and in some cases, a critical threat ? among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.
In this special Dark Reading webcast, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats ? and how you can prepare your enterprise security
APTs have become a major topic of conversation – and in some cases, a critical threat – among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.
In this special Dark Reading webcast, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats – and how you can prepare your