<
>

Posts in Threat detection & defence

CrowdStrike Named a Leader in Endpoint Detection and Response by Independent Research Firm

CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced that Forrester Research, Inc. named CrowdStrike a Leader in The Forrester Wave™: Endpoint Detection And...

Secureworks Announces New Pricing Model for its Managed Detection and Response (MDR) Solution

Secureworks, a leading global cybersecurity company that protects organisations in a digitally connected world, today announced a new pricing model for its Managed Detection and Response (MDR)...

Akamai State Of The Internet / Security Summer 2018: Web Attack Report Shows Hospitality Industry Under Siege From Botnets

Cybersecurity defenders face increasing threats from organizations in the form of bot-based credential abuse targeting the hospitality industry and advanced distributed denial of service (DDoS)...

Beware of Malicious Cryptominers Targeting Android Devices

The rapid development, adoption and increased value of cryptocurrency over the recent years have meant that cybercriminals are ramping up efforts to obtain the various types of cryptocurrencies...

SailPoint Forms Board-Level Cybersecurity Committee to Drive Cyber Risk Resiliency

To better respond to the increasing cybersecurity challenges facing all companies and to continually improve the company’s overall security posture, SailPoint Technologies Holdings, Inc. today...

Symantec Launches Quick Online Tool to Help Consumers and Enterprises Detect Recent VPNFilter Malware on Routers

Symantec Corp., the world’s leading cyber security company, today announced VPNFilter Check, a free online tool designed to help individuals and organizations quickly and simply determine if a...

Effective Data Management and Resilient Response Key To Thwarting Cyber Threats

As more attention is paid to the issues revolving privacy and breach notification, it becomes increasingly important for people to understand what data they have. Therefore, data mapping, according...

The greatest risk to enterprise security is lack of visibility into hybrid networks

While most businesses look outside their walls when assessing their cybersecurity stance, the greater risk to enterprise security is lack of visibility across hybrid network environments. With the...

CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution

This alert is originally published and can be viewed at cisecurity.org OVERVIEW: Multiple vulnerabilities have been discovered in Cisco products including Cisco FXOS Software, Cisco NX-OS...

Victims of malicious crypto miners increase by 44% - as 2.7 million internet users are targeted in a year

The number of internet users that have been attacked by malicious crypto currency mining software has increased from 1.9 million to 2.7 million in just one year. Statistics for the last 24 months...

Pages

Subscribe to RSS - Threat detection & defence