advanced threat detection
DNC Breach Threat Actors Involved In HP Enterprise Hack
In the realm of cybersecurity, recent events have once again brought attention to the persistent and evolving cyber-attack on organizations worldwide. One such incident involves information technology giant Hewlett Packard Enterprise (HPE) ...

Generative AI: Cybersecurity’s Ally or Adversary?
While generative AI offers significant benefits, security professionals must remain vigilant to effectively use the tech for cybersecurity ...

Real-Time Threat Detection in the Cloud
Organizations have moved business-critical apps to the cloud and attackers have followed. 2020 was a tipping point; the first year where we saw more cloud asset breaches and incidents than on-premises ones. We ...

Deepfence Makes ThreatMapper Software Open Source
Deepfence today at the KubeCon + CloudNativeCon North America conference announced today it is making available a ThreatMapper tool that employs lightweight sensors that automatically scan, map and rank application vulnerabilities across ...

Top 20 Most Common Hacker Behaviors
The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers When the OWASP Top 20 Vulnerabilities was first published it revolutionized our industry’s approach to vulnerability management. Instead of ...
Four Key Elements for Comprehensive Network Threat Detection
Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques ...
Four Key Elements for Comprehensive Network Threat Detection
Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques that are repackaged and reused (this post from security ...