News

SOAR vs. Security Operations: What’s Really Going On?

Written by John Czupak, CEO, ThreatQuotient There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us are equally confused about the fundamental capabilities of these technologies, and more pointedly, what problems they aim to solve. Perhaps...

Read more
Machine Learning And The Future Of Security.

By Morgan Jay, Area Vice President at Imperva. We often question what drives the success behind enormous companies like Google and Amazon. A large part of the answer is machine learning. These companies have quickly adopted machine learning, finding smarter ways to apply it and changing the dynamic of how they work. With the extra analytical muscle that machine learning affords, they’re able to drive more intelligent and innovative projects which – let’s be honest...

Read more
CyberArk Unveils Industry’s Most Complete SaaS Portfolio For Privileged Access Security.

CyberArk (NASDAQ: CYBR) today announced ground-breaking new services and enhancements to the industry’s most complete portfolio of Software-as-a-Service (SaaS) offerings for privileged access security.As the industry leader, only CyberArk has the technology expertise and experience to deliver innovative solutions that make it simple and easy for cloud-first organisations and those embracing digital transformation to consume, use and manage privileged access security solutions, especially in hybrid cloud environments.“Privileged access security is foundational to effective cybersecurity programmes....

Read more
Zero Trust Is Shaking Up VPN Strategies.

By Yogi Chandiramani, technical director EMEA at Zscaler The zero trust model has been developed because the distinction between “external” and “internal” areas of information systems has begun to blur. Private applications stand alongside their SaaS-based brethren, while the infrastructure transitions from virtualised servers in the data centre to services and apps residing on public clouds. Users are also changing. Not only are they quite often mobile, but they are also no longer strictly human...

Read more
LinkedIn Accounts For More Than Half Of Social Media Phishing Emails In Q2 2019, According To KnowBe4 Findings.

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, reviewed the results of tens of thousands of simulated phishing tests over the course of Q2 2019 and found that more than 50 percent of those related to social media had “LinkedIn” in the title. With this information, organisations need to train their users how to recognise and manage phishing emails that come into the corporate network. KnowBe4’s analysis shows that...

Read more
AI: A New Era Of Cyber Threat Intelligence.

Byline: Neil Kell, Director of Evolve Security Solutions, part of the CSI As digital footprints widen and the value of data increases, so too does the risk for organisations. The latest Cyber Security Breaches survey reported that 43 per cent of UK businesses experienced a breach in the previous 12 months. This figure rises to 65 per cent in medium to large businesses. No sector is immune from cyber attacks and the increasing level of...

Read more
Navisite And Alert Logic Provide New Managed Threat Detection And Remediation Solution Through Expanded Global Partnership.

Navisite, a part of Spectrum Enterprise, the enterprise-focused arm of Charter Communications, Inc., and Alert Logic, the SIEMless Threat Management™ company, today announced the availability of an enhanced, fully integrated portfolio of Managed Threat Detection and Remediation services for enterprise cloud clients. Navisite is leveraging Alert Logic’s award-winning SIEMless Threat Management platform to expand security offerings for clients. Alert Logic’s platform is tightly integrated in Navisite’s managed security service, enabling automated threat monitoring and remediation,...

Read more
The Evolving Nature Of Cloud Load Balancing.

Written by Ronald Sens, EMEA Director at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and DevOps today: agile, efficiency and, multi-cloud operations. Agile: The movement toward public cloud is arguably driven by an organisation’s desire...

Read more
Securonix Achieves SOC2® + HITRUST CSF® Certification.

Securonix, Inc., the leader in next-gen SIEM, today announced that it has achieved SOC2 + HITRUST Type 2 certification for the Securonix SaaS environment. This is the latest advancement in Securonix’s ongoing commitment to provide a highly secure and industry compliant environment for protecting and safeguarding client information. The certification validates Securonix’s adherence to state and federal security, privacy, and regulatory standards for healthcare data. The Securonix SaaS platform operates on AWS, the most secure...

Read more
Cyber ​​Threat Intelligence: The Key To Trust And Security For The Digital Finance World.

By Anthony Perridge, VP International, ThreatQuotient In 2017, the value per Bitcoin reached over €20,000 (£17,324) - a climax in the hype surrounding the cryptocurrency. However, confidence has been lacking for the price to remain stable. To date, online currencies are more speculation than real means of payment as concerns around security are being raised. An establishment is only possible if users believe in the value’s sustainability, and this applies to every means of payment....

Read more
Page 1 of 1035 1 2 1,035