Latest Posts

A98c8f7dbb46467b790e2ac1fbbd3f50

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

June 18, 2018 Added by:Liviu Arsene

Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

4 Cybersecurity Tips for Staying Safe During the World Cup

June 13, 2018 Added by:Joseph Carson

As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building a Strong, Intentional and Sustainable Security Culture

June 10, 2018 Added by:Perry Carpenter

By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization’s overall defense.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Valve Patches 10-Year Old Flaw in Steam Client

May 31, 2018 Added by:Ionut Arghire

A remote code execution (RCE) vulnerability that existed in the Steam client for at least 10 years was fully patched only in March this year, according to security firm Context Information Security.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

How to Prevent Cloud Configuration Errors

May 29, 2018 Added by:Reuven Harrison

With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

SOC Automation: Good or Evil?

May 24, 2018 Added by:John Moran

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)