SolarWinds Acquires Trusted Metrics

SolarWinds Acquires Trusted Metrics

SolarWinds moved to expand its portfolio of security technologies by acquiring Trusted Metrics, a provider of real-time threat monitoring and management software. SolarWinds immediately then launched SolarWinds Threat Monitor, a tool for ...
Security Boulevard
Fortinet Adds Machine Learning Algorithms to WAF

Fortinet Adds Machine Learning Algorithms to WAF

Fortinet today at the Gartner Security & Risk Management Summit 2018 announced it has infused machine learning algorithms and user-behavioral analytics in its web application firewall to identify nearly 100 percent of ...
Security Boulevard
Fifth Generation of Cybersecurity

Check Point: Time for a Fifth Generation of Cybersecurity

Cybersecurity is entering a new phase that requires IT organizations to put processes in place that are capable of continuously identifying potential threats before they impact operations and detecting them once a ...
Security Boulevard
SSH Management for Stronger Security

Bringing Sanity and Clarity to SSH Management for Stronger Security

Poor to no visibility is a dangerous scenario for enterprise and government IT executives today. In trying to manage their digital infrastructure, they often are faced with one question: Which functional group ...
Security Boulevard
Early in the Kill Chain

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps ...
Security Boulevard
Outsourcing Cybersecurity to Foreign-Based Firms

The Danger in Outsourcing Cybersecurity to Foreign-Based Firms

Sending cybersecurity work offshore isn’t just a bad idea for individual organizations; it can be a security issue. Facing a severe shortage of qualified cybersecurity workers—the InfoSec unemployment rate is expected to ...
Security Boulevard
Security Patches Move Faster

Security Patches: Move Faster to Keep Up With the Bad Guys

You’re tired of hearing it. Most security pundits are tired of saying it. Applying and testing security patches with alacrity is one of the keys to avoiding data breaches. And it looks ...
Security Boulevard
Sophistication in Hackers

2018 Emerging Threats Show New Sophistication in Hackers

One of the problems with threat prevention is that we get too hung up on yesterday’s threats. Security systems are designed for the types of attacks we’ve seen in the past. That’s ...
Security Boulevard
An in-depth malware analysis of QuantLoader

An in-depth malware analysis of QuantLoader

QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we'll take a high-level look at the ...
Encryption 101: Decryptor’s thought process

Encryption 101: Decryptor’s thought process

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses ...
Loading...