Security analytics solution identifies attacks in historic data
Arbor Networks is showcasing at Infosecurity Europe 2014 its Pravail Security Analytics, whose unique looping capability can be used to identify and establish an attack …
300% growth in enterprise attacks across UK and Ireland
At Infosecurity Europe 2014, FireEye announced the release of its Regional Advanced Threat Report for the United Kingdom and Ireland (UKI). Detailing malicious activities …
Airbus Group debuts SCADA research project to mitigate ICS vulnerabilities
Airbus Group will highlight this week at Infosecurity Europe 2014 its range of technologies, services and a cutting edge research project to help governments and industry deal …
Fortinet unveils FortiOS 5.2 to fight APTs
Fortinet unveiled a major update to the FortiOS network security operating system that powers the FortiGate platform at Infosecurity Europe 2014. This release incorporates …
Webroot delivers APT protection for enterprises
Webroot announced the release of BrightCloud Security Services and BreachLogic Endpoint Agent, two cloud-based security offerings designed to help enterprises address the …
McAfee expands Comprehensive Threat Protection
At the RSA Conference, McAfee announced expanded capabilities to find, freeze, and fix advanced threats faster to win the fight against advanced and evasive targeted attacks. …
Top ten points in the fight against cybercrime
At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
What’s the greatest security risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …
The state of targeted attacks
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners …
The operations of a cyber arms dealer
FireEye researchers have linked eleven distinct APT cyber espionage campaigns previously believed to be unrelated, leading them to believe that there is a shared operation …
Featured news
Resources
Don't miss
- Solana’s popular web3.js library backdoored in supply chain compromise
- How widespread is mercenary spyware? More than you think
- Product showcase: Securing Active Directory passwords with Specops Password Policy
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
- SafeLine: Open-source web application firewall (WAF)