Endpoint Security
Latest about Endpoint Security

How a platform approach to security monitoring initiatives adds value
By ITPro published
Whitepaper Integration, orchestration, analytics, automation, and the need for speed

How to secure business printers
By Grace Halverson last updated
In-depth Your office printer is a juicy target for hackers, so what can you do to secure it?

How to keep your customers’ endpoint security covered
By Daniel Todd published
Sponsored The new capabilities that allow for more oversight and control

Google Cloud adds cryptomining protection following widespread exploitation
By Connor Jones published
News In nearly all cases of compromised Google Cloud instances, cryptomining malware was installed within 22 seconds

Why software alone won’t solve the security crisis
By IT Pro published
Sponsored The shift to remote working and emerging cyber threats have the potential to create a perfect storm. Endpoint security requires a new approach

Google Cloud acquires Israeli security startup Siemplify
By Bobby Hellard published
News The SOAR specialist has been described as "the missing piece" for Google's Chronicle platform

Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular
By Davey Winder published
Opinion Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC

Trend Micro Worry-Free Business Security review: Great cloud-managed malware protection
By Dave Mitchell published
Reviews A reassuringly simple endpoint-protection solution – although mobile support is basic
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.