Please turn on your JavaScript for this page to function normally.
money
Worldwide infosec spending to reach $81.6 billion in 2016

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to the latest forecast from …

Ryan Stolte, Bay Dynamics
Security analytics: Risk from the inside out

High profile security breaches are at an all-time high. The threat has finally reached the boardroom, and we’re seeing increased security spending. Funds are increasingly …

threat hunting
How do you win the web security game when the rules keep changing?

Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly …

building blocks
Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

magnifying glass
Looking for trouble: How predictive analytics is transforming cybersecurity

Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …

eye
Hidden in plain sight: Four signs your network might be under attack

It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …

brain
AI system predicts cyber attacks using input from human experts

Today’s security systems usually fall into one of two categories: man or machine. So-called “analyst-driven solutions” rely on rules created by human experts …

threat hunting
The rise of threat hunting

85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …

magnifying glass
Don’t get stuck with dead end User Behavior Analytics

As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no …

How effective are orgs at detecting and investigating cyber threats?

A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

behavior analytics
Balabit’s Blindspotter extends behavior analysis with biometrics

Balabit, best known as “the creator of syslog-ng,” announced the release of Blindspotter version 2016.03 at the RSA Conference in San Francisco. The new version of its …

identify
Identifying abuse of compromised credentials in real-time

DB Networks announced at RSA Conference industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and …

Don't miss

Cybersecurity news