Endpoint Protection | News, how-tos, features, reviews, and videos
Explore related topics
In Black Hat keynote, Whitfield Diffie formulates three rules for making applications secure in the age of the Internet
Security for Virtualization is designed to enable the IT department to manage the protection of virtual and physical endpoints with one console
Devoted cyber sleuths are fighting industrial espionage and botnets
As BYOD moves out of basic email access, IT seeks control over apps and data on users' devices. What can IT actually get?
Traditional guest-based antivirus can sap the life out of your virtualization and storage infrastructure -- learn how to recognize the problem
Symantec warns that its product should not be connected directly to the Internet, yet an estimated 140,000 computers are configured to allow direct external access
But have we come far enough in the 10 years since Bill Gates wrote his Trustworthy Computing Memo?
Cyber insurance can help mitigate damages after a breach, but it's no substitute for top-notch security, IT pros say
Sykipot variant acts as smart card proxy in order to access restricted resources
Hacking group discloses source code segments used in Symantec's Endpoint Protection 11.0 and Antivirus 10.2