Search results for: “threat intelligence”
-
How Hackers Compromise the Software Supply Chain
It seems like a week doesn’t go by without a new vulnerability demonstrating the fragility of the software interdependencies that make up the software supply…
-
Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse
About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Third-party security, ransomware, artificial intelligence (AI) and…
-
Implementing and Managing Your SIEM Securely: A Checklist
Some companies use cloud-based security information and event management (SIEM), and others use SIEM that has been installed in a local data center. These on-premises…
-
Best Privileged Access Management (PAM) Software
Privileged accounts are among an organization’s biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average system…
-
Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner
New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like…
-
IBM Moves Into EDR Market With ReaQta Acquisition
IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its…
-
More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard
A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security…
-
McAfee-FireEye Merger Makes STG’s Plans Clearer
Private equity firm Symphony Technology Group (STG) has been on a cybersecurity buying spree the last two years, acquiring RSA Security, McAfee’s enterprise business and…
-
Best Backup Solutions for Ransomware Protection
Backup has in some sense always been about the security of data. In the event of a data loss or disaster, you could turn to…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)