AppGuard Blog

Posted on Apr 19, 2024

Ultimately, AppGuard is the best solution for keeping the water flowing, the electricity on, and other vital infrastructure running when FBI Director Wray’s warning becomes devastating denial of service attacks. AppGuard is a controls-based tool based on three fundamental controls: launch, containment, and isolation. The combination of these defeats sophisticated attacks. The patented technology makes it practical; it automatically adapts to endpoint changes and unanticipated activities.

Read More ›

Posted on Jul 25, 2023

Post Categories Cybersecurity Zero Trust

Like countless other malware samples, AppGuard stops attacks featuring Mallox ransomware by not allowing the actions it must successfully complete to achieve its goals. This blog post walks readers through how one predicts the outcome when malware runs on a host with controls-based endpoint protection such as AppGuard. Readers will also gain a better understanding of how detection-based anti-malware (AV, EDR, XDR, etc) differ from controls-based endpoint protection such as AppGuard.

Read More ›

Posted on May 29, 2023

Post Categories Cybersecurity

Tools similar to ChatGPT will make detecting malware attacks even more difficult and generally make cyber risks worse for everybody. Read more here about how nearly every tactic of the Mitre ATT@CK framework will be impacted.

Read More ›

Posted on Apr 7, 2023

Post Categories Zero Trust

There are many pedantic frameworks about applying zero trust principles to rein in exorbitant cyber defense costs. The zero trust concept can be simpler than you might realize. Consider the use of devices (PCs, servers), networks, and cloud infrastructure: for every action allowed, something could go terribly wrong that requires somebody to respond when it […]

Read More ›

Posted on Feb 11, 2022

Based on ITRC’s annual 2021 data breach report, one should choose improvements in endpoint protection over other cybersecurity choices for 2022 should do more to improve malware risk mitigation and decrease IT/Sec-Ops costs. We believe the best way to achieve this is by filling detection gaps with zero trust WITHIN endpoints.

Read More ›

Posted on Jan 3, 2022

After about five seconds, the adversary has total undetectable, remote control of the targeted host. AvosLocker Ransomware manipulates and triggers Windows Safe Mode to evade detection defenses. AppGuard, a protection tool applying zero trust principles within endpoints, prevents it from getting this far.

Read More ›

Posted on Dec 14, 2021

Post Categories Cybersecurity Enterprise Government & Military Server Zero Trust

The CVE-2021-44228 vulnerability reported in an Apache library known as “Log4j” affects numerous products and cloud services across the Internet that leverage Apache. Organizations with vulnerable servers can be confident that AppGuard can help protect them from the effects of ensuing attacks.

Read More ›

Posted on Nov 10, 2021

Post Categories Cybersecurity Enterprise Zero Trust

AppGuard joined its partner Cipher at the FinCyber Today event on 3 November 2021. Cipher delivered an informative demo of how to detect, stop and respond to a cyberattack. Overall, the conference featured prominent subject matter experts in cybersecurity sharing insights and recommendations with attendees.

Read More ›

Posted on Oct 4, 2021

Post Categories Cybersecurity Enterprise Server Zero Trust

Zero-day attacks, breaches due to missing patches, weaponized documents, drive-by downloads, and some code injections are examples of AppJacking. Read about the AppJacking concepts to understand better ways to mitigate these risks using Zero Trust principles within endpoints.

Read More ›

Posted on Sep 28, 2021

Post Categories Cybersecurity Enterprise Server Zero Trust

The files within your endpoint folders can hurt you. Enterprises need to supplement their detection-based defenses with tools that do not have to recognize malicious files to defeat them. This blog strives to explain to executives what their technical people need them to understand about other layers of protection that can mitigate these risks.

Read More ›

Topics

Subscribe

Subscribe to our blog to receive email notifications when new posts are added!

Loading