Remove Antivirus Remove CSO Remove Technology
article thumbnail

How to choose an endpoint protection suite

CSO Magazine

Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. Antivirus, more appropriately known as antimalware, has matured significantly since the days of dedicated antivirus servers, daily signature updates, and manually managed policies.

Antivirus 124
article thumbnail

BrandPost: How Much Risk Are You Willing to Take?

CSO Magazine

Just as the threat landscape evolves over time, so does security technology. Having been in the cyber security space for more than 15 years, I have witnessed a number of evolutions first hand.

Antivirus 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Webroot files patent infringement claim against Trend Micro

CSO Magazine

Security endpoint protection vendor Webroot has filed a patent infringement complaint against competitor Trend Micro accusing it of implementing patented technology in its security software and systems without authorization. To read this article in full, please click here

Marketing 126
article thumbnail

What is SIEM? Security information and event management explained

CSO Magazine

SIEM software (pronounced ‘sim’; the ‘e’ is silent) collects and aggregates log and event data generated throughout the organization’s technology infrastructure, from host systems and applications to network and security devices such as firewalls and antivirus filters.

Antivirus 122
article thumbnail

Massive threat campaign strikes open-source repos, Sonatype spots new CursedGrabber malware

Security Affairs

Here’s how the malware execution sequence would appear to a Windows user: The “Windows NT is not supported” message shown in the screenshot, however, is a false error thrown by the malware in an attempt to fool both antivirus products and the end-user. The malware dropped by lib2.exe explains Castro.

Malware 143
article thumbnail

BrandPost: Measuring HP Sure Click Enterprise’s Return on Investment

CSO Magazine

HP Security – Sure Click Enterprise has transformed endpoint security with an innovative approach that leverages leading-edge isolation and micro-virtualization technology. To read this article in full, please click here

article thumbnail

4 ways attackers target humans to gain network access

CSO Magazine

Every day, I see the failure in our technology. We hope that our antivirus or endpoint protection software alerts us to problems. When technology fails, it’s likely because the attacker made an end run around it by targeting humans. I’m sure you see it as well. In reality, it often does not. Here are four ways they do it.