article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

No one in cybersecurity refers to “antivirus” protection any more. since the nascent days of the antivirus market, I find in fascinating that the top dozen or so antivirus players have all managed to remain in the game. In the early days, antivirus suites were threat-centric and device-centric. Looming consolidation.

Antivirus 174
article thumbnail

AI may not Destroy the World, but There are Other Risks

Security Boulevard

Whether it’s Hal refusing to open the pod bay doors in 2001: A Space Odyssey or the wild thought experiment of Roko’s Basilisk—or even way back to (retellings of) Frankenstein’s monster or the ancient legend of the Golem—there’s a fear that our creations will turn against us. For some, AI is the stuff of nightmares.

Risk 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bitdefender offers mobile security to chats on messaging apps

CyberSecurity Insiders

NOTE 1- Sold with the name as SOFTWIN between 1996 to 2001, the software company was renamed as Bitdefender in the year 2007. From then, the company has been offering antivirus software, multi-cloud security, extended detection and response and anti-virus and IoT protection.

Mobile 101
article thumbnail

Bitdefender vs. McAfee: Consumer & Enterprise Endpoint Security Software Compared

eSecurity Planet

For enterprises—and a growing number of consumer antivirus solutions—machine learning (ML) and behavioral-based detection are increasingly important for stopping unknown threats. Bitdefender has been protecting millions of consumers and businesses since 2001 and is a global leader in cybersecurity. Bitdefender. Key Differentiators.

Software 122
article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

billion Employees count: ~7,500 Appearances on eSecurity Planet s Top Vendors lists: 14 Trend Micro (OTC: TMICY) customers cite high value and ease of use across a portfolio of tools such as antivirus , full disk encryption , cloud workload protection platforms (CWPP), and intrusion detection and prevention systems (IDPSs). Visit Fortinet 3.

article thumbnail

The Language and Nature of Fileless Attacks Over Time

Lenny Zeltser

I traced the origins of “fileless” to 2001, when Eugene Kaspersky (of Kaskersky Labs) used it in reference to Code Red worm’s ability to exist solely in memory. It fascinates me not only because of its relevance to malware, but also because of its knack for agitating many security practitioners.

Malware 85
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Satori DataSecOps 2021 Private BluBracket Software supply chain 2021 Private Cape Privacy Data security 2021 Private ZecOps Digital forensics 2019 Private SecurityScorecard Risk ratings 2017 Private Carbon Black Security software 2015 Acquired: VMware AVG Antivirus software 2015 Acquired: Avast. ForgePoint Capital.