Please turn on your JavaScript for this page to function normally.
tunnel
An introduction to deception technology

This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …

lightbulb
It only takes one data point to blow open a threat investigation

Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s …

Apple
Fooling security tools into believing malicious code was signed by Apple

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security …

Windows Defender
Microsoft to provide Windows Defender ATP for older OS versions

Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. …

Dallas
Researchers showcase automated cyber threat anticipation system

A group of researchers is trying to develop an automatic early warning system that should help defenders take preventative action before specific cyber attacks start …

meltdown
Meltdown and Spectre: To patch or to concentrate on attack detection?

Patching to protect machines against Meltdown and Spectre attacks is going slow, and the provided patches, in some instances, lead to more problems than just slowdowns. In …

watch
AI is key to speeding up threat detection and response

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …

puzzle
Bitglass announces integration with Trustwave Managed Security Services

Bitglass announced at RSA Conference 2017 new integration with the Trustwave Managed Detection service. This service has been enhanced to support events and additional threat …

Eyes
Insider threat solution for rapid response to in-progress attacks

CyberArk announced at RSA Conference 2017 advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution, to automatically …

threat hunting
Trustwave introduces proactive threat hunting service

Trustwave announced at RSA Conference 2017 new and enhanced managed security and professional services designed to help short-circuit an attacker’s activities by detecting …

qualys cloud agent platform
Qualys Cloud Platform offers two new disruptive services

Qualys announced a major expansion of its Qualys Cloud Platform. New services include File Integrity Monitoring (FIM) and Indicators of Compromise (IOC) detection solutions …

IBM Watson for cybersecurity
IBM Watson to power cognitive security operations centers

At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools