Search results for: “threat intelligence”
-
Some Cybersecurity Startups Still Attract Funding Despite Headwinds
With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to…
-
IDS & IPS Remain Important Even as Other Tools Add IDPS Features
Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for…
-
Best Wi-Fi Security & Performance Testing Tools
The prevalence of Wi-Fi has been accelerating for two decades, but in the last two years, it’s surged even further as so many people were…
-
Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk
The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j…
-
Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges
The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending…
-
8 Best Business Continuity Software Solutions
Even a single hour of downtime can cost businesses over $1 million, and costs can quickly add up, considering the average downtime for ransomware attacks…
-
Why You Need to Tune EDR to Secure Your Environment
Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic…
-
How Hackers Evade Detection
Bypassing detection tools is part of a hacker’s routine these days. Despite the incredible evolution of defensive technologies, attackers often remain undetected for weeks or…
-
Best Enterprise Mobility Management (EMM) Solutions
Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that’s evolved to address mobile security, access management, and…
-
Newly Discovered Malware Evades Detection by Hijacking Communications
While the cybersecurity world is focused on the Russian invasion of Ukraine, new research from Symantec serves as a reminder that significant threats remain elsewhere…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (199)
- Video (17)