<
>

Posts in Threat detection & defence

Are Your Conversations On Messaging Apps Secure?

Concerns regarding issues such as censorship, privacy and escalating cyber threats have meant that organisations are putting added measures in place to make their communication platforms more secure...

It's not all doom and gloom. Why GDPR Provides Businesses the Opportunity to Improve Data Privacy and Security

The most talked about element of the EU’s General Data Protection Regulation has to be the hefty fines and penalties that organisations could potentially face for non-compliance. EU-based...

CSM-ACE 2018: Palo Alto Networks Interview - How Technology and Security Are Moving in Opposite Directions

“Today’s problem is that the world of technology and the world of security designed to protect technology are moving in opposite directions”, said Alvin Tan, Regional Head, ASEAN,...

McAfee Accelerates and Improves Both Data Protection and Threat Prevention across Device to Cloud

McAfee, the device to cloud cybersecurity company, today announced new products expanding its McAfee MVISION portfolio, a first-of-its-kind solution that allows customers to deploy security on their...

Duo Security and Exabeam Partner to Expedite User-Based Threat Detection and Response

Unified Access Security leader Duo Security and Exabeam, the next-gen Security Information and Event Management (SIEM) company, have partnered to enhance and accelerate organizations’ threat...

Fortanix and Alibaba Cloud Partner to Launch SDKMS Runtime Encryption Key Management on Alibaba Cloud ECS to Protect Sensitive Data

Fortanix® Inc., the leader in Runtime Encryption®, today announced its partnership with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key...

Trend Micro Redefines Endpoint Security with Trend Micro Apex One™

Trend Micro Incorporated, a global leader in cybersecurity solutions, today launched the evolution of its advanced endpoint security offering. Now re-branded as Trend Micro Apex One™, the...

Stopping Hidden Threats: How to Defend Against Fileless Attacks

Just like tsunamis wreaking havoc in certain parts of the world, fileless attacks are creating similar damages in the cybersecurity scene. Fileless attacks are basically set of tactics that are...

CyberSecurity Asean security alert on Critical Patches Issued for Microsoft Products, October 9, 2018

This alert is originally published and can be viewed at www.cisecurity.org OVERVIEW: Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow...

Carbon Black Introduces Cb ThreatHunter, Delivering Advanced Threat Hunting and Incident Response (IR) Capabilities on the Cb Predictive Security Cloud(TM) (PSC)

Carbon Black, a leader in next-generation endpoint security delivered via the cloud, today introduced Cb ThreatHunter, delivering powerful, new, advanced threat hunting and IR capabilities on the Cb...

Pages

Subscribe to RSS - Threat detection & defence