The State of Endpoint Security: Past, Present and Future

June 14, 2017

Is Malware Winning? It does not look like things are getting better in the world of cybersecurity… powerful ransomware, breaches affecting 100+ million people, state-sponsored attacks and unprecedented vulnerabilities. Just think back to 2017 that saw WannaCry ransomware, NotPetya wiper malware, and the Equifax breach, to name just a few incidents. Shipping giant Maersk estimates that the “NotPetya cyberattack cost it $250m-$300m in lost business.”1 Already this year, Meltdown and Specter vulnerabilities have affected computing environments at a scale not seen before. According to a SANS survey, 53% of organizations have experienced an endpoint compromise within the last two years.

Spotlight

Western NRG, Inc

Western NRG provides Internet Security solutions to small and medium sized organizations throughout North America. Our entire team is SonicWall-trained, and our technical engineers hold the highest level of SonicWall certification. Our team gets to know you and your network, then layers on extensive technical knowledge to deliver and support a superior security solution. We provide solutions for: Network Security. Wireless Security. Access Security. Email Security. Secure Mobile Access.

OTHER WHITEPAPERS
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More

Spotlight

Western NRG, Inc

Western NRG provides Internet Security solutions to small and medium sized organizations throughout North America. Our entire team is SonicWall-trained, and our technical engineers hold the highest level of SonicWall certification. Our team gets to know you and your network, then layers on extensive technical knowledge to deliver and support a superior security solution. We provide solutions for: Network Security. Wireless Security. Access Security. Email Security. Secure Mobile Access.

Events