How to Choose an Application Whitelisting Solution 
ColorTokens » Endpoint Security
by Jai Balasubramaniyan
2y ago
The ever-increasing threat of attacks from new and unknown malware strains has made application whitelisting an important tool to secure endpoints and servers. At its core, whitelisting takes a zero trust approach to security by allowing only the known good to run while preventing all unknown files and applications from executing. This trust-centric approach helps you secure your applications from malware, zero-day attacks, ransomware, lateral threats, and advanced file-less attacks. Top 5 Features to Look for in an Application Whitelisting Solution Not all application whitelisting products ar ..read more
Visit website
4 Top Benefits of Application Whitelisting
ColorTokens » Endpoint Security
by Jai Balasubramaniyan
2y ago
With over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) being discovered every day, protecting applications has become a significant challenge for enterprises and organizations. While antivirus and antimalware software generally do a solid job of blocking known cyber threats, it’s practically impossible to keep tabs on all new and emerging threats that are unknown and have yet to be discovered.   This is where application whitelisting plays a key role. Application whitelisting solutions provide protection against a whole range of threats by ..read more
Visit website
Application Whitelisting vs. Application Blacklisting: Pros and Cons
ColorTokens » Endpoint Security
by Vivek Biswas
2y ago
Applications are often targeted by various threat actors who attempt to exploit vulnerabilities for money and data. According to the Ponemon Institute’s 2020 Cost of a Data Breach Report, data breaches on average cost $3.86 million. Given this hefty price tag – and the growing sophistication of today’s cyber threats – it’s vital enterprises protect applications from attacks by controlling how and why they’re accessed.  The two most popular approaches to application control are whitelisting and blacklisting, and it’s worth understanding how they can help protect your network from thre ..read more
Visit website
3 Key Takeaways from NIST SP 800-167: Guide to Application Whitelisting
ColorTokens » Endpoint Security
by Vivek Biswas
2y ago
The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce. NIST’s SP 800-167: Guide to Application Whitelisting provides a comprehensive overview of application whitelisting, including guidance to help organizations understand, evaluate, and implement application whitelisting technology. In this blog, we’ll explore three key takeaways from NIST SP 800-167, and why they matter for your organization. What is Application Whitelisting? Before diving into the takeaways, here’s a quick introduct ..read more
Visit website
6 Types of Application Whitelisting
ColorTokens » Endpoint Security
by Jai Balasubramaniyan
2y ago
With attempted cyberattacks on the rise, application whitelisting can be an important addition to your security infrastructure. It is a simple yet effective tool to prevent zero-day attacks and unknown malware from accessing applications. Application whitelisting takes advantage of a variety of application file and folder attributes to ensure that only vetted and whitelisted files/processes are allowed to run. 6 Types of Application Whitelisting Attributes Here are six types of application whitelisting attributes that can be used to secure applications.  1. File Path Whitelisting File pat ..read more
Visit website
Best Practices for Special-Purpose System Security
ColorTokens » Endpoint Security
by Shivram Nayak
2y ago
Endpoints come in all shapes and sizes, with most of them serving as devices that connect to various applications for feeding data, processing and verifying information, and ensuring seamless organizational and business transactions. While portable devices like laptops, tablets, and cell phones are commonly used multifunction endpoints, there are also a range of special–purpose endpoints which are connected to the network to perform specific transactions like payments (i.e. card-swiping machines), check-ins (i.e. airport kiosks), and machine control (i.e. industrial control systems).  ..read more
Visit website
Cybersecurity for Retailers: Protecting POS Systems from Cyber Threats
ColorTokens » Endpoint Security
by Shivram Nayak
2y ago
The retail industry has been hit hard by cyberattacks, as cybercriminals target huge piles of credit card data and personally identifiable customer information. One of the most common attack vectors has been through compromised Point of Sale (POS) systems. Hackers have targeted POS systems to gain entry into the retailer’s network since these systems are generally the least secure link in any retailer’s network infrastructure.    What is a POS Attack? A POS attack takes advantage of vulnerable POS systems by deploying malware which allows the attacker to steal fin ..read more
Visit website
Windows 7 End of Life: Protect Legacy Systems from Cyberattacks
ColorTokens » Endpoint Security
by Shivram Nayak
2y ago
In early 2020, the decade-old Windows 7 and Windows Server 2008 R2 reached the end of life. This means that Microsoft will no longer provide technical assistance, bug-fixes, software patches, and security updates for the OS for both businesses and consumers. Windows 7 was launched on July 22, 2009, and recent reports suggest that up to 39% of all PCs could still be running on it. With no support or patches for any new security vulnerability, all Windows 7 systems and servers running on Server 2008 R2 will now become easy targets for hackers and malware attacks. Microsoft has urged all users to ..read more
Visit website
Data Breach Cost in India Rises by 8% in 2 Years to $1.6 Million
ColorTokens » Endpoint Security
by Shivram Nayak
2y ago
A recently published joint report by the Data Security Council of India (DSCI) and PwC found that there has been a significant increase in the cost of a data breach in the last two years. The study states that the average cost of a data breach in India has gone up to INR 119 million (USD 1.6 million), an increase of 7.9% from 2017, and the average cost of a malicious insider attack rose by 15% in 2019 from last year. Why Cyber Incidents are Increasing in India India is one of the fastest-growing economies in the world with digital adoption taking place at an unprecedented scale. According to t ..read more
Visit website
How Indian Financial & Research Institutions Can Thwart DTrack Malware
ColorTokens » Endpoint Security
by Mukul Ahluwalia
2y ago
By Mukul Ahluwalia (Product Marketing Manager, ColorTokens), Ajay Kumar (Senior Security Analyst, ColorTokens) and Deepak Polam Reddy (Quality Engineer, ColorTokens) A new strain of malware, known as DTrack, was recently detected infecting financial institutions across 18 states of India. Maharashtra bore the brunt of the attack with 24% of the infected systems, followed by Karnataka at 18.5% and Telangana at 12%. Other states include Tamil Nadu, Delhi, Kerala, Uttar Pradesh, and West Bengal. What is DTrack Malware DTrack is a spy tool that can upload and download files, record keystrokes, and ..read more
Visit website

Follow ColorTokens » Endpoint Security on FeedSpot

Continue with Google
Continue with Apple
OR