Insight Engines' Alexa-enabled Cyber Security Investigator for Splunk product is now generally available.
The hacker or hackers appear to have gained admin level access for several months before they were detected.
A recent study found that less than 1 percent of stolen data records are protected with encryption.
And 21 percent have fallen victim to phishing attacks, a recent survey found.
The new Incident Explorer feature turns discrete event data into actionable security intelligence.
For the credit bureau that recently suffered a massive data breach, the news just keeps getting worse.
EiQ Networks, Now Called Cygilant, Nabs $7 Million in Funding
And another 32 percent haven't yet decided whether they will or not, a recent survey found.
The startup sets a record for container security funding amid intensifying demand from enterprises.
The exposed data, part of TargetSmart's VoterBase, belonged to third party vendor Equals3.
Total funding to date now stands at $70M as the company continues to grow.
Still, 69 percent say the data is too voluminous and complex to be actionable, a recent survey found.
Were the regulation already in effect, the company could have faced more than $120 million in fines.
There are a lot of different pitfalls when it comes to IoT security that developers need to avoid.
Enterprise mobility management (EMM) is a sophisticated technology for controlling mobile access to data and networks. We review five of the top EMM solutions.
The online training provider raises millions to help IT professionals and job seekers gain some much-needed cybersecurity expertise.
The exploit, which requires no user interaction, can give the attacker control of the affected device.