Search results for: “threat intelligence”
-
How Steganography Allows Attackers to Evade Detection
Steganography, derived from Greek words meaning “covered” and “writing,” has been used for centuries to hide secret messages inside regular documents. In cybersecurity, steganography mainly…
-
AI & ML Cybersecurity: The Latest Battleground for Attackers & Defenders
Machine learning (ML) and artificial intelligence (AI) have emerged as critical tools for dealing with the ever-growing volume and complexity of cybersecurity threats. Machines can…
-
Best Facial Recognition Software for Enterprises
Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a…
-
SIEM Explained: What is SIEM and How Does it Work?
Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger…
-
Best Internet Security Software & Suites
Malware is one of the biggest threats businesses face, and with nearly a third of all malware coming through the internet and email, businesses and…
-
How Hackers Compromise the Software Supply Chain
It seems like a week doesn’t go by without a new vulnerability demonstrating the fragility of the software interdependencies that make up the software supply…
-
Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse
About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Third-party security, ransomware, artificial intelligence (AI) and…
-
Implementing and Managing Your SIEM Securely: A Checklist
Some companies use cloud-based security information and event management (SIEM), and others use SIEM that has been installed in a local data center. These on-premises…
-
Best Privileged Access Management (PAM) Software
Privileged accounts are among an organization’s biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average system…
-
Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner
New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (199)
- Video (17)