Search results for: “threat intelligence”
-
IBM Moves Into EDR Market With ReaQta Acquisition
IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its…
-
More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard
A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security…
-
McAfee-FireEye Merger Makes STG’s Plans Clearer
Private equity firm Symphony Technology Group (STG) has been on a cybersecurity buying spree the last two years, acquiring RSA Security, McAfee’s enterprise business and…
-
Best Backup Solutions for Ransomware Protection
Backup has in some sense always been about the security of data. In the event of a data loss or disaster, you could turn to…
-
McAfee Finds Years-Long Attack by Chinese-Linked APT Groups
An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim organization’s…
-
Apple Patches Vulnerabilities in iOS Exploited by Spyware
Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on…
-
Microsoft, Google Among Tech Giants Pledging Big Money to Cybersecurity
Some of the biggest names in tech are promising to spend more than $30 billion to bolster cybersecurity capabilities, from securing the supply chain and…
-
Neural Fuzzing: A Faster Way to Test Software Security
Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (199)
- Video (17)