Transcript
CyberWire Host (0:02)
You're listening to the CyberWire network powered by N2K.
Nyla Genoi (0:15)
The word is endpoint Security spelled endpoint for user devices that connect to a network and security for protection. Definition the practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. Example Sentence Endpoint security schemes can cover a wide spectrum of user devices, from traditional computers like desktops, laptops and servers to virtual workloads in the cloud to mobile devices, devices like phones and other wearables to peripherals like printers to IoT devices like niche functions in energy and medical to business consumer interfaces like ATMs and self service, grocery store cash registers origin and context Computer scientists began experimenting with securing mainframes in the 1970s. The idea of endpoint security didn't really begin until after the personal computer revolution in the 1980s and the arrival of the first viruses. In 1986, the brain boot sector virus started to propagate and according to Daniel Snyder at Info Carnivore, Brain Boot came with contact information. For the authors who created it, it was a simpler time. The first antivirus programs started appearing as freeware and shareware tools. Researchers used a bulletin board chat group called Virus L to exchange information, tools and shareware for the purpose of removing virus infections. The first commercial antivirus products came from companies like GData Software and McAfee in the late 1980s. Today, endpoint security has evolved from antivirus products as the only solution in town to a pallet of security enhancement solutions. Examples include traditional antivirus sandboxing, personal firewalls, encryption, anti exploitation, anti malware, patch management, asset management, and endpoint detection and response, or edr. EDR solutions typically collect endpoint telemetry in the cloud and run machine learning algorithms on the data to find malicious activity. XDR solutions combine EDR telemetry with network detection and response, or NDR telemetry in a similar manner. Nerd Reference One of the Virizelle bulletin board chat group members was John McAfee. McAfee started his own endpoint protection company called McAfee Associates and became one of the most famous and eventually infamous cybersecurity personalities ever. In 1992, he launched a marketing campaign that warned the world of the Michelangelo virus that he claimed, could infect up to 5 million PCs worldwide. He predicted that on the 6th of March of that year it would destroy the data of all those infected hard drives. Sales boomed, according to Andrew Kautz at the website Digital Trends, by that March, at least half the Fortune 500 companies had deployed the McAvy Associates antivirus product. But on 7 March, nothing happened. Security pundits accused Mr. McAvie of fabricating the entire thing. By 1994, Mr. McAvee's reputation was so bad that the board forced him out of his company with a whopping $100 million severance package. After that, he dabbled in a few other businesses, became a yoga guru and enthusiastically embraced the sport of aero trekking. An insane sport which, according to Clouts, involved soaring through the air on a half motorcycle, half hang glider contraption called a kite plane. After an accident where two people died, Mr. McAvie fled to Belize to escape a lawsuit. And that's where the real craziness kicked in. With alleged paranoia, a harem of allegedly underage women, alleged drugs, alleged mercenaries and potentially alleged murder. Allegedly oh, also libertarian politics and YouTube videos slagging his former company. He died on 23 June 2021. Sam Sheppard from CNBC News reported it this way.
![endpoint security [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F9e5e6830-daa3-11ef-be70-f73b8b60a48b%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)