Why We Need To Reframe the False-Positive Problem
January 5 2022Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have.
Read moreEfforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have.
Read moreRemember the Equifax breach? Remember the $700m penalty? In case you'd forgotten, here's the FTC to refresh your memory!
Read moreOrganizations need to take matters into their own hands with a new approach.
Read moreOur digital interactions are being analyzed, predicted, and protected by algorithms and serve as a strategic, digital arsenal in defending against cyberattacks.
Read moreBoth Russia and Ukraine are preparing for military operations in cyberspace.
Read moreThe Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.
Read moreThe Oregon-based hospitality and dining business reports the data was compromised in a Dec. 12 ransomware attack.
Read moreMicrosoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.
Read moreGoogle says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
Read moreMany of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.
Read more
Recent Comments