An Evolution In Endpoint Security

New focus and budget are being paid to endpoint security

Add bookmark

It's Thursday, so the cyber security landscape has forever changed again. It changes on a daily basis. Yesterday's network vulnerabilities are today's strengths. Tomorrows threat vectors will eventually be defended. And so it goes.

But the cyber security landscape really has had step-change. The global pandemic brought us to the Future of Work in less than 12 parsecs. Strategy plans that were laid out to execute in two years were executed in two weeks. Attacks evolved as the network perimeter seamingly endlessly expanded. And the CISO abided and has kept the enterprise safe.

We recently posted that endpoint security and access management are having a dovetail moment

There are many takeaways to glean from the Cyber Security Hub Mid-Year Report. One of particular interest is what is happening to endpoint security investment.

What must be an absolute result of the workforce shift- endpoint security went from the fifth highest to the second highest spend in the past six months.

The cyber security universe is aligning to focus endpoint security.

 

 


Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended