The Truth Behind the Scope of the Endpoint Problem in the Enterprise


The Evolution of the “Endpoint” Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops [...]



The Top 5 IoT Lessons I Learned From Hollywood


In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects. Research firms estimate that there will be between 20 billion and 30 billion IoT devices on Earth by 20201 and that they will [...]



IoT Devices in the Network: Can you find them?


In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such [...]



By | August 10th, 2016|Endpoint Protection, Internet of Things, IoT, Security|0 Comments

HEAT Software Meets the Need for Endpoint Protection Head-On


In many organizations, endpoints see virtually constant change. Users access, download, and utilize applications, data, drivers, files, toolbars, widgets, etc., introducing both new security threats and undocumented changes in systems and processes. For better or for worse, all of these activities leave their mark on the endpoint. HEAT has engaged in endpoint security at a [...]



By | December 11th, 2015|APT, Endpoint Protection, Malware, Persistent Threat|0 Comments

EMA Research Shows that Cyber Security is Achieving Executive Visibility in a Big Way


One of the services that EMA provides to the tech industry is research. During the course of the year, numerous projects are launched to help IT consumers and vendors understand market perceptions. EMA then provides analysis and forecasts on trends based upon those perceptions. These projects have been continued in 2015. EMA has already had [...]



By | November 20th, 2015|APT, Endpoint Protection, Malware, Security|0 Comments

The Limits of Packet Capture


In preparation for my new 'Achieving Hi-Fidelity Security' research project, I thought I would post a relevant blog I wrote for InformationSecurityBuzz.com. I have packet capture data for forensics, isn’t that enough? No! Of late, I have briefed with a number of companies that provide full network packet capture capabilities.  They tout its benefits and that [...]



Load More Posts