Welcome to the report summarizing this industry survey, conducted in Q1 and 2, 2023. It attracted 150 responses
from senior cybersecurity professionals at manufacturing
We benchmark where the pain points are for
defenders and what organizations are doing to overcome these
issues, the extent...
SentinelOne CEO Tomer Weingarten hit back at endpoint security rivals CrowdStrike and Microsoft and rumored M&A suitor Wiz for publicly fanning acquisition flames. The endpoint security firm called Wiz acquisition rumors "a head-scratcher," "far from fact" and "pure speculation on their part."
Malwarebytes laid off at least 100 workers this week and plans to split its consumer and corporate-facing business units into separate companies. The antivirus firm cut also recently axed its chief product officer, chief information officer and chief technology officer.
We know servers to be an attacker’s ultimate target, but while they do store or process large amounts of sensitive data, the argument can be made that the attack surface is somewhat limited and thus more secure. True, non-IT users don’t usually have access to servers, meaning less non-qualified users making bad...
CrowdStrike CEO George Kurtz said point product companies "are quickly going the way of legacy antivirus" as rivals SentinelOne and BlackBerry reportedly hunt for buyers. The endpoint security market is quickly consolidating from being "littered with dozens of companies" to having several vendors.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alex Waintraub, DFIR expert evangelist at CYGNVS, discusses how generative AI will play a role in the future of incident response - and in all aspects of cybersecurity - and emphasizes its dangers as well as its benefits.
In a world accustomed to multiple, fragmented technologies and point solutions, organizations need a unified approach that supports endpoint security and management across heterogeneous devices and operating systems. They need fast deployment and rapid time to value, in both the cloud and on-premise implementations....
Innovations in generative AI have accelerated, with applications across large language models, image and video generation, and audio/voice. Organizations want to know how these developments change the cyber threat landscape. In this discussion, we will talk about the risks generative AI poses and how to prepare for...
Malware developers are adopting an easy-to-use obfuscation tool that slips malware past antivirus, warn security researchers. BatCloak requires minimal programming skills to use. Among its recent successes is a recent remote access Trojan dubbed SeroXen.
With our increasing reliance on digital systems and technology, the only thing that has outpaced are cyberattacks and their criticality.
This whitepaper talks about the cybersecurity trinity that executives need to leverage to protect their Endpoint security when it comes to dealing with incidents and...
SentinelOne plans to ax approximately 105 workers after a significant drop in data usage for products with consumption-based pricing caused revenue to fall short of expectations. The company revealed plans to reduce its staff by 5% to remain on track with achieving non-GAAP profitability next year.
Learn about best practices for privileged access management (PAM) in the context of how you’d secure valuables in your own home. In this episode of The Drawing Board, our experts discuss three PAM controls for guarding the pathways leading to the most sensitive resources in your house:
Relying on basic endpoint protection is a recipe for stress and anxiety for your SecOps team. As threats become more complex, move to a platform that:
Uniquely combines network and endpoint detection technologies.
Provides elite prevention, detection and response efficacy.
Offers a multitude of managed services...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
In the latest weekly update, ISMG editors discuss how Russia's invasion of Ukraine upended the cybercrime ecosystem, a lawsuit against a U.S. cardiovascular clinic that seeks a long list of security improvements, and the latest endpoint protection technology trends in the Gartner Magic Quadrant.