tunnel light

Threat hunting still maturing and mostly ad-hoc

Threat hunting is becoming an integral part of defensive activities in larger enterprises or those that have been heavily targeted in the past, according to a new SANS survey. …

brain

Cybersecurity: To automate or not to automate?

There are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial …

How attackers exploit whitelists

If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …