The best test for an EDR solution is one that works for you

Credit to Author: Akshay Bhargava| Date: Thu, 28 May 2020 15:15:00 +0000

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expertise, and requirements.

Categories:

Tags:

(Read more…)

The post The best test for an EDR solution is one that works for you appeared first on Malwarebytes Labs.

Read more

Explained: cloud-delivered security

Credit to Author: Pieter Arntz| Date: Tue, 05 May 2020 15:15:00 +0000

What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.

Categories:

Tags:

(Read more…)

The post Explained: cloud-delivered security appeared first on Malwarebytes Labs.

Read more

Harnessing the power of identity management (IDaaS) in the cloud

Credit to Author: Malwarebytes Labs| Date: Tue, 18 Feb 2020 17:25:42 +0000

With security, compliance, and customer engagement driving organizations to the cloud, it’s no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.

Categories:

Tags:

(Read more…)

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

Explained: data enrichment

Credit to Author: Pieter Arntz| Date: Thu, 16 Jan 2020 18:27:53 +0000

Data enrichment applies to the process of enhancing, refining, and improving raw data. Used by companies to improve marketing efforts, data enrichment impacts both privacy and security.

Categories:

Tags:

(Read more…)

The post Explained: data enrichment appeared first on Malwarebytes Labs.

Read more

Explained: edge computing

Credit to Author: Pieter Arntz| Date: Mon, 30 Dec 2019 18:41:23 +0000

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Categories:

Tags:

(Read more…)

The post Explained: edge computing appeared first on Malwarebytes Labs.

Read more

Explained: What is containerization?

Credit to Author: Pieter Arntz| Date: Wed, 04 Dec 2019 17:00:00 +0000

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Categories:

Tags:

(Read more…)

The post Explained: What is containerization? appeared first on Malwarebytes Labs.

Read more

Explained: juice jacking

Credit to Author: Pieter Arntz| Date: Thu, 21 Nov 2019 16:00:00 +0000

Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.

Categories:

Tags:

(Read more…)

The post Explained: juice jacking appeared first on Malwarebytes Labs.

Read more