Search results for: “threat intelligence”
-
8 Best Business Continuity Software Solutions
Even a single hour of downtime can cost businesses over $1 million, and costs can quickly add up, considering the average downtime for ransomware attacks…
-
Why You Need to Tune EDR to Secure Your Environment
Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic…
-
How Hackers Evade Detection
Bypassing detection tools is part of a hacker’s routine these days. Despite the incredible evolution of defensive technologies, attackers often remain undetected for weeks or…
-
Best Enterprise Mobility Management (EMM) Solutions
Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that’s evolved to address mobile security, access management, and…
-
Newly Discovered Malware Evades Detection by Hijacking Communications
While the cybersecurity world is focused on the Russian invasion of Ukraine, new research from Symantec serves as a reminder that significant threats remain elsewhere…
-
How Steganography Allows Attackers to Evade Detection
Steganography, derived from Greek words meaning “covered” and “writing,” has been used for centuries to hide secret messages inside regular documents. In cybersecurity, steganography mainly…
-
AI & ML Cybersecurity: The Latest Battleground for Attackers & Defenders
Machine learning (ML) and artificial intelligence (AI) have emerged as critical tools for dealing with the ever-growing volume and complexity of cybersecurity threats. Machines can…
-
Best Facial Recognition Software for Enterprises
Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a…
-
SIEM Explained: What is SIEM and How Does it Work?
Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger…
-
Best Internet Security Software & Suites
Malware is one of the biggest threats businesses face, and with nearly a third of all malware coming through the internet and email, businesses and…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)