Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.
Read moreNew ‘BianLian’ Ransomware Variant on the Rise
August 22 2022Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
Read moreTanium: Taking A Deeper Cut At Converged Endpoint Management
August 22 2022Tanium’s Chris Hollenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
Read moreWe haven't validated this vuln ourselves... but the source of the story is impeccable. (Impeccably dressed, at least.)
Read morePentera Helps Enterprises Reduce Their Security Exposure
August 22 2022Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
Read moreCisco: All Intelligence is Not Created Equal
August 22 2022Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.
Read moreIdentity Security Pain Points and What Can Be Done
August 22 2022Replacing passwords is not as easy as people think, but there is hope.
Read moreHow Qualys Reduces Risk and Enables Tool Consolidation
August 22 2022Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.
Read moreExpiring Root Certificates Threaten IoT in the Enterprise
August 22 2022What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.
Read moreHyundai Uses Example Keys for Encryption System
August 22 2022This is a dumb crypto mistake I had not previously encountered:
A developer says it was possible to run their own software on the car infotainment hardware after discovering...
Read more
Recent Comments