Editorial
With today's highly distributed workforce and their potentially compromised home networks, the need for protecting the endpoint has never been greater. The challenge, of course, is that so many of today's endpoints are completely out of the control of the IT team. Further complicating the matter is that many work-from-home employees have no idea how to do such basic security tasks as updating firmware in their routers or running basic security checks on their network and hardware. But endpoint security issues don't begin and end with the pandemic and remote employees — there are a myriad of challenges facing IT staffs trying to protect and defend the endpoints that exist in the cloud, business partners' data centers, service accounts, kiosks, and a plethora of other endpoints. This ebook looks at today's overriding endpoint security issues, as well as the challenges security teams face in detecting and responding to endpoint vulnerabilities when endpoints are beyond the physical reach of security teams.
Do you know what's in your email messages? If you're like most of us, it's a spear phishing attack with a possible side order of ransomware. While the Nigerian Prince attacks might have slowed, attackers are becoming more effective with finely tuned spear phishing attacks, often disguised as an insider attack. Today you're very likely to be facing fileless attacks that can bypass antimalware/antivirus software, so what's a CISO to do? It is those tactics that we will address in this ebook.
Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users' mailboxes.
This special report looks at secure email gateways and secure web gateways, identifying their vulnerabilities and how these legacy products remain relevant.