Eskenzi PR ad banner Eskenzi PR ad banner

Threat Detection

Fingerprint Biometrics Computer

The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn’t stopped individuals and collectives with malicious intent from pirating or hacking these tools and using them to nefarious ends. Cobalt Strike is one such tool that is being widely abused, and if your organisation has...

Read moreDetails
Secbi

Now security operations centers (SOC) and managed security service providers (MSSPs) can benefit from a comprehensive solution including detection, investigation, and automated response that delivers significant boosts in effectiveness and productivity. Despite the intuitive coupling of automated response with advanced, machine-learning detection, the SOAR (security, orchestration, automated response) solutions available on the market typically fall short of offering both functionalities. “Talk about scaling the SOC often seems to involve a connected series of fools’ errands,”...

Read moreDetails
Forescout

Forescout Technologies, Inc. (NASDAQ: FSCT), the leader in device visibility and control, today announced its continued investment in OT security with the release of SilentDefense 4.0. Building on one of the most advanced and mature OT network monitoring and intelligence platform, Forescout’s latest enhancements will provide enterprises with improved productivity, lower risk profiles and faster mitigation of threats. “The convergence of IT and OT is increasing the complexity and vulnerability of previously isolated ICS networks,”...

Read moreDetails
Perfect Storm cybersecurity

A perfect storm of regulation, increased threats and technological complexity is overwhelming cyber security decision makers, reveals new research from Symantec (NASDAQ: SYMC). Four in five (82 percent) security leaders across France, Germany and the UK report feeling burned out, whilst just under two-thirds (63 percent) think about leaving the industry or quitting their job (64 percent). Surveying 3,045 cyber security decision makers across the across France, Germany and the UK, the research - conducted...

Read moreDetails
Alert Logic Announces Capabilities For Endpoint, Multi-Cloud, And Dark Web.

Alert Logic, the SIEMless Threat Management™ company, has today announced that it has added a new extended endpoint protection capability along with other new capabilities for anti-virus integration, log collection and search for Office 365, Microsoft Azure Event Hubs integration, user behaviour anomaly detection for Amazon Web Services (AWS) environments, and dark web scanning. This expanded attack surface coverage enriches Alert Logic’s offering with even greater detection and protection support along with enhanced visibility across...

Read moreDetails
Adaptiva Introduces The Future Of Vulnerability Management With Evolve VM At RSA Conference 2019.

Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, today launched a new endpoint compliance and vulnerability management product, Evolve VM™. Evolve VM harnesses Adaptiva's industry-leading peer-to-peer technology to automatically detect and remediate thousands of vulnerabilities on a massive scale and at the fastest speeds possible. The company will unveil Evolve VM at RSA Conference ! 2019, being held March 4-8 at Moscone Center in San Francisco. Evolve VM leverages...

Read moreDetails
deepsecure.jpg

Deep Secure, the creator of Content Threat Removal technology, today announces the launch of Content Threat Removal-as-a-Service (CTRaaS), a new cloud-based service that will stop organisations from falling victim to cyberattacks concealed in digital content. Cybercriminals are increasingly using content as a vehicle for spreading malware, ransomware and undetectable threats. Rather than detecting and protecting against these threats, Content Threat Removal creates an exact visual replica of any content that is shared with the organisation,...

Read moreDetails
SentinelOne Collaborates With Intel To Increase Detection Rates Of Cryptominer And Advanced Memory-Based Attacks.

SentinelOne, the autonomous endpoint protection company, and Intel today announced the integration of hardware-based Intel® Threat Detection Technology (Intel TDT) Accelerated Memory Scanning capabilities with the SentinelOne autonomous endpoint protection console. Independent benchmark testing from Passmark Software validates that SentinelOne’s approach, using Intel’s silicon to power threat scanning, significantly increases detection rates of memory-based attacks such as crypto miners, while providing a 10x improvement in scanning time with no increase in CPU usage. Intel and...

Read moreDetails
cybereason

Cybereason, creators of the leading Cyber Defense Platform, today announced it has outperformed every competitor as a result of the MITRE ATT&CK Evaluations, released earlier today. The company’s Cyber Defense Platform demonstrates best-in-class automated threat detection, including total coverage across all MITRE ATT&CK phases, the most real-time alerts, and correlation. As a high-level benchmark, the results show that Cybereason covered more of the ATT&CK framework included in the evaluations than any of the other eight...

Read moreDetails
Radiflow Incorporates Dynamic Vulnerability Assessment Scoring Into Its Industrial Threat Detection Solution.

Radiflow, a leading provider of industrial cybersecurity solutions for industrial automation networks, today announced that the company has added dynamic vulnerability assessment scoring capabilities in the new release of its iSID industrial threat detection solution. The current practices for risk assessments and security remediations employed by industrial enterprises and critical infrastructure operators generally rely on manual evaluations and follow unstructured processes. These processes are often time consuming and are not sufficiently responsive to changes in...

Read moreDetails
Page 3 of 5 1 2 3 4 5