DTX Manchester DTX Manchester

Threat Detection

Deep Secure Launches Content Threat Removal-As-A-Service To Defeat 100% Of Content Threats.

Deep Secure, the creator of Content Threat Removal technology, today announces the launch of Content Threat Removal-as-a-Service (CTRaaS), a new cloud-based service that will stop organisations from falling victim to cyberattacks concealed in digital content. Cybercriminals are increasingly using content as a vehicle for spreading malware, ransomware and undetectable threats. Rather than detecting and protecting against these threats, Content Threat Removal creates an exact visual replica of any content that is shared with the organisation,...

Read more
SentinelOne Collaborates With Intel To Increase Detection Rates Of Cryptominer And Advanced Memory-Based Attacks.

SentinelOne, the autonomous endpoint protection company, and Intel today announced the integration of hardware-based Intel® Threat Detection Technology (Intel TDT) Accelerated Memory Scanning capabilities with the SentinelOne autonomous endpoint protection console. Independent benchmark testing from Passmark Software validates that SentinelOne’s approach, using Intel’s silicon to power threat scanning, significantly increases detection rates of memory-based attacks such as crypto miners, while providing a 10x improvement in scanning time with no increase in CPU usage. Intel and...

Read more
cybereason

Cybereason, creators of the leading Cyber Defense Platform, today announced it has outperformed every competitor as a result of the MITRE ATT&CK Evaluations, released earlier today. The company’s Cyber Defense Platform demonstrates best-in-class automated threat detection, including total coverage across all MITRE ATT&CK phases, the most real-time alerts, and correlation. As a high-level benchmark, the results show that Cybereason covered more of the ATT&CK framework included in the evaluations than any of the other eight...

Read more
Radiflow Incorporates Dynamic Vulnerability Assessment Scoring Into Its Industrial Threat Detection Solution.

Radiflow, a leading provider of industrial cybersecurity solutions for industrial automation networks, today announced that the company has added dynamic vulnerability assessment scoring capabilities in the new release of its iSID industrial threat detection solution. The current practices for risk assessments and security remediations employed by industrial enterprises and critical infrastructure operators generally rely on manual evaluations and follow unstructured processes. These processes are often time consuming and are not sufficiently responsive to changes in...

Read more
New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats.

With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. It aggregates and evaluates disconnected data feeds to help identify what threats pose a danger to the organisation and ensure security teams focus on the right...

Read more
Something In Common: Two Notorious Russian Speaking Hacking Groups Found Sharing Infrastructure With Each Other.

Kaspersky Lab experts have identified an overlap in cyberattacks between two infamous threat actors, GreyEnergy – which is believed to be a successor of BlackEnergy – and the Sofacy cyberespionage group. Both actors used the same servers at the same time, with, however, a different purpose. BlackEnergy and Sofacy hacking groups are considered to be two of the major actors in the modern cyberthreat landscape. In the past, their activities often led to devastating national...

Read more
Netscout Logo

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today introduced NETSCOUT Arbor Edge Defense (AED), a new security solution that redefines the perimeter cyber security stack and serves as the first and last line of defense against multiple types of inbound and outbound threats. “Data center and network architectures are becoming increasingly distributed, straining traditional perimeter enforcement points. At the same time, targeted campaigns are now backed by...

Read more
Tripwire Logo

Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organisations, announced with Lastline®, the leader in AI-powered network security, a partnership agreement that will incorporate Lastline’s advanced malware detection technology into Tripwire’s Malware Detection Service. Tripwire’s resulting solution combines Lastline malware analysis with Tripwire® Enterprise's change detection capabilities to identify malware as soon as it is introduced to a system. "Cyber incidents always involve some kind of change to...

Read more
AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through  Open Threat Exchange.

OTX Endpoint Threat Hunter Delivers Simple, Fast Threat Visibility to Assess Business Risk from Malware and Other Threats. At RSA Conference 2018, AlienVault®, the leading provider of Unified Security Management® (USM) and crowdsourced threat intelligence, today announced the launch of its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user. This first-of-its-kind service natively leverages over 19 million indicators of compromise (IoCs) contributed to...

Read more
Threat Detection

Ensono™, a leading hybrid IT services provider, partnered with Alert Logic, a leading provider of Security-as-a-Service solutions, to deliver continuous monitoring, threat detection and response for Ensono’s managed Amazon Web Services (AWS) clients. Ensono will leverage Alert Logic’s managed security service offering built on Alert Logic Cloud Defender suite to deliver increased security and compliance protection for clients’ data, workloads and applications based on AWS. This new service offering combines security tools, experts and operational...

Read more
Page 3 of 4 1 2 3 4