monitoring

Researchers use AI and create early warning system to identify disinformation online
Researchers at the University of Notre Dame are using artificial intelligence to develop an early warning system that will identify manipulated images, deepfake videos and …

Increasing number of false positives causing risk of alert fatigue
More than two-fifths (43%) of organizations experience false positive alerts in more than 20% of cases, while 15% reported more than half of their security alerts are false …

Tech pros should consider modern APM tools to gain insight across the entire application stack
While application performance management (APM) has become mainstream with a majority of tech pros using APM tools regularly, there’s work to be done to move beyond …

CIOs using AI to bridge gap between IT resources and cloud complexity
There’s a widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems, a Dynatrace survey of 800 …

Global internet freedom declines for the ninth consecutive year
Governments around the world are increasingly using social media to manipulate elections and monitor their citizens, tilting the technology toward digital authoritarianism. As …

Investigations are an unfortunate fact of life for most corporations
Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5. The survey focused on …

Six steps for implementing zero trust access
Modern organizations are no longer governed by fixed perimeters. In fact, the perimeter-based security model is disintegrating in a world where users work on their own devices …

Organizations need greater visibility into network activity
One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security …

Botnets shift from Windows towards Linux and IoT platforms
Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

Is your organization getting physical security right?
For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior …

Current and emerging third-party cyber risk management approaches and challenges
Managing third-party cyber risk is critical for businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could …

Less than 20% of IT pros have complete access to critical data in public clouds
Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility