Search results for: “threat intelligence”
-
Phishing Campaign Used Morse Code to Evade Detection: Microsoft
A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of social engineering efforts by…
-
An Investment Firm Built Its Own SIEM. Here’s How.
SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s…
-
Microsoft Security Under Scrutiny After Recent Incidents
Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant…
-
Best Incident Response Tools and Software
With major cybersecurity incidents an almost daily occurrence, organizations need an incident response plan for the likelihood that they will someday be breached. And more…
-
LinkedIn Hack is Scraped Data, Company Claims
A hacker who recently offered 700 million LinkedIn records for sale alarmed LinkedIn users and security specialists, but the company insists the data is linked…
-
FireEye, Mandiant to Split in $1.2 Billion Deal
FireEye is selling its core cybersecurity products to a group led by private equity firm Symphony Technology Group (STG) in order to focus on its…
-
And the Winner of the 2021 RSAC Innovation Contest is…
The RSA Conference’s Innovation Sandbox Contest has been a source of new ideas and approaches for an ever-evolving cybersecurity industry for 16 years. This year’s…
-
SentinelOne Product Review
Endpoint detection and response (EDR) is a vital tool for creating an effective security infrastructure for your organization. Endpoints are the most common entry point…
-
ManageEngine Product Review for 2021
ManageEngine is a division of Zoho Corporation and offers a full suite of IT management tools. This includes security, help desk, networking, and application performance.…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (200)
- Video (17)