Tag Archive

DeepSec Video: Temet Nosce – Know thy Endpoint Through and Through; Processes to Data

Published on January 29, 2016 By lynx

Endpoint security is where it all starts. The client is the target most attackers go after. Once you have access there (let’s say by emailing cute cat videos), you are in. Compromised systems are the daily routine of information security. Even without contact  with the outside world, you have to think about what happens next. […]

DeepSec Video: Deactivating Endpoint Protection Software in an Unauthorized Manner

Published on January 26, 2016 By lynx

The information technology world is full of fancy words that re-invent well-known and well-understood terms. Everyone is talking about the endpoint these days. Endpoint is the trusty old client in disguise. Plus the end in endpoint doesn’t means that something ends there. From the information security point of view all your troubles actually start there. […]

DeepSec 2015 Talk: Deactivating Endpoint Protection Software in an Unauthorized Manner

Published on September 7, 2015 By lynx

Your infrastructure is full of endpoints. Did you know that? You even have endpoints if you use your employees’ devices (BYOD!) or the „Cloud“ (YMMV!). Can’t escape them. Since the bad girls and guys knows this, they will attack these weak points first. How are your endpoints (a.k.a. clients in the old days) protected? In […]