threat detection

Meltdown and Spectre: To patch or to concentrate on attack detection?
Patching to protect machines against Meltdown and Spectre attacks is going slow, and the provided patches, in some instances, lead to more problems than just slowdowns. In …

AI is key to speeding up threat detection and response
Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …

Bitglass announces integration with Trustwave Managed Security Services
Bitglass announced at RSA Conference 2017 new integration with the Trustwave Managed Detection service. This service has been enhanced to support events and additional threat …

Insider threat solution for rapid response to in-progress attacks
CyberArk announced at RSA Conference 2017 advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution, to automatically …

Trustwave introduces proactive threat hunting service
Trustwave announced at RSA Conference 2017 new and enhanced managed security and professional services designed to help short-circuit an attacker’s activities by detecting …

Qualys Cloud Platform offers two new disruptive services
Qualys announced a major expansion of its Qualys Cloud Platform. New services include File Integrity Monitoring (FIM) and Indicators of Compromise (IOC) detection solutions …

IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …

ZeroFOX sets up research team to expose social media threats
ZeroFOX announced the formalization of the industry’s first security research team dedicated to exposing social media threats, driving innovative defensive technology and …

Visibility and assessment of vulnerable attack paths
Attivo Networks announced that its ThreatMatrix Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack …

Most CISOs and CIOs need better resources to mitigate threats
Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff …

How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility