Whether you’re looking at the barrage of increasingly
sophisticated ransomware variants or deeply embedded
corruptions in the software and vendor supply chains,
it’s impossible to ignore the fact that if security is a
game, the game has been changed beyond recognition.
It’s high time to modernize your...
The Uptycs Threat Research team publishes this quarterly bulletin as a 3-month lookback, summarizing the trends and findings of their original threat intel across the three major operating systems: Linux, Windows and macOS.
The Threat Research Team regularly monitors the TTPs (tactics, techniques and...
It's critical to enable companies to not only see what is going on in their IT environments, but to also quickly react, and "sheer manpower" is no longer sufficient to respond to the surge of cyberthreats evolving today, says Mike DeCesare, CEO of Exabeam.
While adversaries are often still using many of the same old methods and exploits to compromise their victims, the exposure and consequences of these attacks are becoming increasingly damaging, says Bryan Ware, CEO of LookingGlass Cyber Solutions. He discusses how to keep ahead of the adversaries.
Erwän Keräudy and Jeff Gore of CybelAngel say that due to cloud migration, people working remotely, and the connected ecosystem of suppliers, "the perimeter is dead." We need a comprehensive assessment of critical external threats, they say, including a scan of "the infrastructure of the internet."
Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that's stored on Forescout's platform.
Boston Children's Hospital thwarted a cyberattack by government-backed Iranian hackers last summer after U.S. authorities received intelligence about the pending assault and alerted the hospital, says FBI Director Christopher Wray, who called Iran's planned cyberattack "despicable."
In 2021, Mandiant Threat Intelligence identified 80 zero-days exploited in the wild, which is more than double the previous record volume in 2019. State-sponsored groups continue to be the primary actors exploiting zero-day vulnerabilities, led by Chinese groups.
Join Mandiant’s Erin Joe, SVP of Strategy and...
Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
XDR is quickly becoming a preferred solution for security teams seeking a coordinated, holistic approach to their security operations.
By empowering teams with limitless ingestion, analysis, and protection across the entire organization, Elastic's Limitless XDR offering unifies data types to improve detection,...
Elastic has been named a Strong Performer in the 2022 Forrester Endpoint Detection and Response Providers Wave.
Elastic Security provides a different approach from other endpoint detection and response (EDR) vendors by combining EDR and SIEM capabilities, substantially reducing customers’ mean time to detect and...
Unfortunately, in this day and age, protecting assets is more difficult than ever from the corporate point of view. Organizations have spent many years and countless sums of money protecting the perimeter —
so-called “north-south” traffic. Yet agile, adaptive adversaries have found ways to breach perimeter...
Even in the best of times, chief information security officers (CISOs) and their teams face numerous challenges in protecting the brand, the business and
sensitive data against ever-changing threats—all with finite and constrained resources. Today, those challenges are more extreme than ever. In a rapidly
changing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.