Dell releases new tool to detect BIOS attacks

Computer manufacturing giant Dell released on Friday a new security tool that detects attacks attempting to modify a computer’s BIOS component.

Named the Dell SafeBIOS Events & Indicators of Attack, the tool works by detecting changes to a Dell computer’s BIOS configuration and raising an alert in companies’ management consoles.

The tool’s purpose is to give system administrators the ability to isolate workstations that may have been compromised, to be set aside for remediation.

The tool is not meant to replace the full capabilities of an endpoint security system (antivirus). Instead, the tool is intended to provide protection against a series of attacks (BIOS attacks) that most antivirus products are not engineered to handle or detect.

“Detection at this level allows organizations to respond to advanced threats quickly and successfully, interrupting the attack chain before it’s able to do more damage,” the company said on Friday.

Dell said the tool will be provided for free to all its enterprise customers. The tool has already been made available for download as part of the Dell Trusted Device solution.

The Dell SafeBIOS Events & Indicators of Attack tool is just the latest Dell security offering the company has made available to its customers in recent weeks. Since the onset of the coronavirus (COVID-19) pandemic, Dell has offered existing customers flexible endpoint security solutions to help them:

  • Better secure today’s new working model as quickly as possible with VMware Carbon Black who has eliminated endpoint limits until June 20, 2020.
  • Pressure test remote work deployments with Secureworks‘ accelerated vulnerability assessments, and get faster deployment and flexible payment options for Secureworks’ managed detection and response and incident response solutions.
  • Securely deploy work-from-home devices with Dell Technologies who is offering temporary licenses for Dell Encryption until May 15, 2020.

Hot this week

The Quiet Dangers of Overlooking Basic Security Hygiene

Basic security hygiene prevents more breaches than advanced tools, yet most teams overlook fundamentals while chasing sophisticated threats.

Your Password Strategy Is Wrong and Making You Less Secure

The decades-old advice on password complexity is forcing users into insecure behaviors. Modern security requires a shift to passphrases, eliminating mandatory rotation, and embracing passwordless authentication.

Why API Security Is Your Biggest Unseen Threat Right Now

APIs handle most web traffic but receive minimal security attention, creating massive unseen risks that traditional web security tools completely miss.

Security Teams Are Asking the Wrong Questions About AI

Banning AI tools is a failing strategy that creates shadow IT. Security teams must pivot to enabling safe usage through approved tools, clear guidelines, and employee training.

The Illusion of Secure by Default in Modern Cloud Services

Moving to the cloud does not automatically make you secure. Default configurations often create significant risks that organizations must actively address through proper tools and processes.

Topics

The Quiet Dangers of Overlooking Basic Security Hygiene

Basic security hygiene prevents more breaches than advanced tools, yet most teams overlook fundamentals while chasing sophisticated threats.

Your Password Strategy Is Wrong and Making You Less Secure

The decades-old advice on password complexity is forcing users into insecure behaviors. Modern security requires a shift to passphrases, eliminating mandatory rotation, and embracing passwordless authentication.

Why API Security Is Your Biggest Unseen Threat Right Now

APIs handle most web traffic but receive minimal security attention, creating massive unseen risks that traditional web security tools completely miss.

Security Teams Are Asking the Wrong Questions About AI

Banning AI tools is a failing strategy that creates shadow IT. Security teams must pivot to enabling safe usage through approved tools, clear guidelines, and employee training.

The Illusion of Secure by Default in Modern Cloud Services

Moving to the cloud does not automatically make you secure. Default configurations often create significant risks that organizations must actively address through proper tools and processes.

The Hidden Costs of Automated Security Tools

Automated security tools often create more problems than they solve when implemented without strategic human oversight, leading to alert fatigue and missed threats.

The Real Problem With Security Awareness Training

Security awareness training fails because it focuses on compliance rather than behavior change. The solution involves integrating security into daily work rather than treating it as a separate activity.

The Unseen Cost of Cloud Migration

Cloud migrations create hidden security debt through rushed decisions and poor documentation, shifting rather than eliminating risk in ways teams often miss until it is too late.
spot_img

Related Articles

Popular Categories