Fidelis Cybersecurity
Fidelis Cybersecurity now supports Amazon Virtual Private Cloud traffic mirroring
Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced support for Amazon Virtual Private Cloud (Amazon VPC) traffic …
Fidelis Cybersecurity appoints Craig Harber as CTO
Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced the appointment of Craig Harber as Chief Technology Officer. …
Fidelis Cybersecurity offer Threat Research as a Service
Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced the launch of Threat Research as a Service (TRaaS), a …
Fidelis Cybersecurity hires a Chief Scientist
Fidelis Cybersecurity (Fidelis), a leading provider of threat detection, threat hunting, and response solutions, announced the appointment of Dr. Abdul Rahman as chief …
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility
As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …
Fidelis Cybersecurity announces support for Microsoft Azure’s virtual network TAP
Fidelis Cybersecurity now supports Microsoft Azure’s virtual network terminal access point (TAP) to enable mirroring of virtual machine (VM) network traffic, without the use …
The 24×7 Fidelis MDR service team now bolsters internal security teams
Rates of cybercrime and nation-state espionage are increasing while the cybersecurity skills gap continues to grow. To better support security teams and operations in this …
Photo gallery: Infosecurity Europe 2018 Expo, part 2
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
Using deception to gain enterprise IoT attack visibility
The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and …
Excessive alerts, outdated metrics, lead to over-taxed security operations centers
A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …
Achieving zero false positives with intelligent deception
Cyber attacks are not single events. When attackers compromise an asset, they don’t know which asset is infected. They must determine where they are in the network, the …
New infosec products of the week: January 26, 2018
Empowering security teams with unlimited security data collection, indexing and search Exabeam Data Lake centralizes all relevant logs to reduce the work of collecting logs …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments