Search results for: “MITRE”
-
CrowdStrike vs Symantec: Top EDR Solutions Compared
Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product…
-
Application Security is Key to Stopping Ransomware, Vendor Says
Recent news headlines have shown how vulnerable even large companies with many resources at their disposal are to ransomware. While these attacks may feel inevitable,…
-
Cynet 360 XDR Review: Features & Benefits
If May’s endpoint detection and response (EDR) MITRE evaluations weren’t proof enough, Cynet’s flagship platform – also featuring XDR and MDR capabilities – continues to…
-
OWASP Names a New Top Vulnerability for First Time in Years
OWASP security researchers have updated the organization’s list of the ten most dangerous vulnerabilities – and the list has a new number one threat for…
-
McAfee Finds Years-Long Attack by Chinese-Linked APT Groups
An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim organization’s…
-
Palo Alto Enters Small Business, Remote and Home Markets with Okyo
Palo Alto Networks (PANW) is bringing its enterprise-class security to small business and home markets with Okyo, a Wi-Fi 6 hardware device announced today. At…
-
Hackers Leak 87,000 Fortinet VPN Passwords
In the latest lesson about the importance of patching, the credentials for 87,000 Fortinet FortiGate VPNs have been posted on a dark web forum by…
-
Microsoft Issues ProxyShell Advisory After Attacks Begin
Microsoft this week issued an advisory about three vulnerabilities referred to collectively as ProxyShell days after security researchers at a federal government cybersecurity agency warned…
-
An Investment Firm Built Its Own SIEM. Here’s How.
SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s…
Latest Articles
Popular Categories
- Applications (97)
- Cloud (62)
- Compliance (34)
- Endpoint (73)
- Mobile (41)
- Networks (324)
- Products (351)
- Threats (320)
- Trends (164)