Please turn on your JavaScript for this page to function normally.
Fidelis Cybersecurity now supports Amazon Virtual Private Cloud traffic mirroring

Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced support for Amazon Virtual Private Cloud (Amazon VPC) traffic …

Fidelis Cybersecurity appoints Craig Harber as CTO

Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced the appointment of Craig Harber as Chief Technology Officer. …

hand
Fidelis Cybersecurity offer Threat Research as a Service

Fidelis Cybersecurity, a leading provider of threat detection, threat hunting, and response solutions, announced the launch of Threat Research as a Service (TRaaS), a …

Fidelis Cybersecurity hires a Chief Scientist

Fidelis Cybersecurity (Fidelis), a leading provider of threat detection, threat hunting, and response solutions, announced the appointment of Dr. Abdul Rahman as chief …

hunt
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …

Fidelis Cybersecurity announces support for Microsoft Azure’s virtual network TAP

Fidelis Cybersecurity now supports Microsoft Azure’s virtual network terminal access point (TAP) to enable mirroring of virtual machine (VM) network traffic, without the use …

The 24×7 Fidelis MDR service team now bolsters internal security teams

Rates of cybercrime and nation-state espionage are increasing while the cybersecurity skills gap continues to grow. To better support security teams and operations in this …

Photo gallery: Infosecurity Europe 2018 Expo, part 2

Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.

eye dark
Using deception to gain enterprise IoT attack visibility

The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and …

virtual reality
Excessive alerts, outdated metrics, lead to over-taxed security operations centers

A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …

bulb
Achieving zero false positives with intelligent deception

Cyber attacks are not single events. When attackers compromise an asset, they don’t know which asset is infected. They must determine where they are in the network, the …

Proxmox Mail Gateway
New infosec products of the week​: January 26, 2018

Empowering security teams with unlimited security data collection, indexing and search Exabeam Data Lake centralizes all relevant logs to reduce the work of collecting logs …

Don't miss

Cybersecurity news