Insufficient internal access controls make it easy for attackers to spread laterally, steal intellectual property via cyberespionage and disrupt business operations.
Read MoreAdvanced anti-virus (AV) capability detects multiple attack vectors to prevent file-based, fileless, and in-memory attacks with the power of artificial intelligence (AI) and the cloud.
Read MoreOptiv Security has introduced “EnemyPerspectives@Optiv,” an integrated suite of services that allows the modern organisation to evaluate its digital footprint from the perspective of a potential threat actor, from that actor’s intent, and then take prioritised steps to remediate...
Read MoreNETSCOUT SYSTEMS has released its 2018 NETSCOUT Threat Intelligence Report, offering globally scoped internet threat intelligence together with the analysis of our security research organization. The report covers the latest trends and activities from nation-state advanced persistent...
Read MoreBitdefender has launched Bitdefender GravityZone Security for Storage to protect enterprises...
Read MoreAllows companies to maintain ownership and control of encryption keys and enforce data protection...
Read MoreUsers now gain real-time access to DOSarrest’s suite of Cloud-based security services,...
Read MoreAlmost two-thirds will retract or review use of data following the Facebook/Cambridge Analytica...
Read MoreCb LiveOps is built on an industry-leading security platform that combines real-time query and...
Read MoreCisco is to acquire privately-held Duo Security, headquartered in Ann Arbor, Mich. Duo Security...
Read MoreLatest version of Fireware operating system introduces new IntelligentAV service for malware...
Read MoreBromium’s Protected App builds a wall around critical applications on the endpoint and secures...
Read MoreMimecast has acquired security software developer Solebit for approximately $88M net of cash...
Read MoreContinuously detects and verifies web app vulnerabilities at the speed of DevOps, identifies...
Read MorePartnership provides trusted, cloud-based platform for integrated identity management and data...
Read More