Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreach Today to discuss ways for businesses to protect their growing external attack surface.
Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that's stored on Forescout's platform.
Boston Children's Hospital thwarted a cyberattack by government-backed Iranian hackers last summer after U.S. authorities received intelligence about the pending assault and alerted the hospital, says FBI Director Christopher Wray, who called Iran's planned cyberattack "despicable."
In 2021, Mandiant Threat Intelligence identified 80 zero-days exploited in the wild, which is more than double the previous record volume in 2019. State-sponsored groups continue to be the primary actors exploiting zero-day vulnerabilities, led by Chinese groups.
Join Mandiant’s Erin Joe, SVP of Strategy and...
Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
XDR is quickly becoming a preferred solution for security teams seeking a coordinated, holistic approach to their security operations.
By empowering teams with limitless ingestion, analysis, and protection across the entire organization, Elastic's Limitless XDR offering unifies data types to improve detection,...
Elastic has been named a Strong Performer in the 2022 Forrester Endpoint Detection and Response Providers Wave.
Elastic Security provides a different approach from other endpoint detection and response (EDR) vendors by combining EDR and SIEM capabilities, substantially reducing customers’ mean time to detect and...
Unfortunately, in this day and age, protecting assets is more difficult than ever from the corporate point of view. Organizations have spent many years and countless sums of money protecting the perimeter —
so-called “north-south” traffic. Yet agile, adaptive adversaries have found ways to breach perimeter...
Even in the best of times, chief information security officers (CISOs) and their teams face numerous challenges in protecting the brand, the business and
sensitive data against ever-changing threats—all with finite and constrained resources. Today, those challenges are more extreme than ever. In a rapidly
changing...
Ransomware is an epidemic companies can’t ignore. Malware attacks are
becoming more pervasive and sophisticated, while ransomware as a service
now targets governments and companies of every size.
The push for innovation has resulted in unprecedented software development.While this development has been...
Traditional alert monitoring is not working.
Most enterprises see over 11,000 alerts per day from an average of 6.8 threat intelligence feeds, according to a 2020 Palo Alto networks report. Almost three-quarters of an analyst’s time is spent “investigating, triaging, or responding to alerts, and most of these...
There are currently 359,000 unfilled/open IT Security Jobs in the U.S. Globally, the shortage of cybersecurity professionals is estimated to be 2.72 Million. The challenges with recruiting, hiring, and retaining experienced security personnel have reached a whole new, maddening level, driven by a system straining to...
Managed Detection and Response (MDR) is changing the way businesses address their security risks, and the move to MDR is projected to continue for years to come. The tipping point on the long-predicted shift, according to Gartner Research, comes in 2025, when over 50% of organizations will have adopted some level of...
deepwatch commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Managed Detection and Response (MDR). The purpose of this study is to provide readers with a framework to evaluate the potential...
Healthcare sector organizations should prepare to deal with potential hacktivist attacks tied to controversy surrounding the U.S. Supreme Court's leaked draft ruling and eventual final decision involving Roe vs. Wade, says attorney Erik Weinick of the law firm Otterbourg PC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.