bringing advanced threat protection to the cloud

This post was originally published here by  Salim Hafid. Threats to corporate data are growing at a rapid pace, particularly with malware and ransomware becoming more sophisticated. The potential for a zero-day attack to compromise your endpoints, cloud apps, and more is very high. In fact, more endpoints are at risk now with the popularity […]

What is Threat Hunting in Cybersecurity Defense

This post was originally published here by Håkon Olsen. WHAT IS HUNTING AND WHY DO IT? A term that is often used in the cybersecurity community is threat hunting. This is the activity of hunting for intruders in your computer systems, and then locking them out. In the more extreme cases it can also involve […]

Trillium Inc vows to eliminate cyber attacks on Autonomous Cars

Trillium Inc, a Tokyo-based company has pledged to close the cyber security gap that threatens to stop self-driving cars from being hijacked or stopped midway. Very recently, the company received Series A Financial funding to strengthen its stand in the business of cyber security and lead investors who were involved in the investment includes Global […]

Enterprise Information Networks and the Threat Environment

This post was originally published here by OLIVER LAVERY. Securing an enterprise information system is no trivial task. That is because today’s systems are complex and need to be viewed holistically. No longer can IT security only think of a network as a combination of components that can be protected by compartmentalizing them. Today’s networks are […]

Threats Driving You Nuts? Try Threat Hunting With Sqrrl

This article originally appeared on the IBM Security Intelligence blog. Squirrels have many predators and enemies (hawks, snakes and, of course, cars), but Sqrrl shows how the hunted can become the hunter. Sqrrl is a leading threat hunting platform that is deeply integrated with IBM QRadar SIEM. Visualizing ThreatsWhen the IBM Security App Exchangelaunched in 2015, its primary goal was to […]

Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat

Kevin Townsend  wrote an interesting post about Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat that I would like to share. “A new report highlights the high number of users still operating outdated Windows operating systems and unsupported browsers. This represents a huge threat to the organizations whose users access company networks from insecure […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!