analytics
HackNotice to Democratize Threat Intelligence
HackNotice announced today it has added a set of free analysis and visualization tools to enable end users to know when their personally identifiable information has been disclosed. The tools, dubbed Risk ...
Application Control and Traffic Shaping: key factors to consider
If you’re like me, then you’ve been pretty busy lately coping with the new world in which we find ourselves. Regardless, the team and I have made some interesting observations, which I ...
How CSPs Can Build Trust With 5G Security
The era of 5G means a deeper and different level of security for networks We are set to undergo a major transformation and soon we will no longer be a global civilization ...
SASE and QoE: What you need to know
Since Gartner introduced the Secure Access Service Edge (SASE) concept last year, we see growing interest about it among our partners and customers across the globe. However, quite a few people are ...
Continuous Intelligence Driver for Cyber Success
As malicious cyberattacks and data breaches continue to rise, many organizations are finding it more and more difficult to keep up with the evolving threat landscape—a realization that is forcing IT and ...
Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?
Terabit(s) per second DDoS attacks have not disappeared. Perhaps they were just taking a rest. AWS just reported a 2.3 Tbps attack earlier this year that tried to knock out cloud services ...
Auth0 to Streamline Analysis of Reputation Data
Auth0 has acquired Apility.io in part to gain access to an application programming interface (API) through which curated IP, email and domain reputation data will be fed into the Auth0 anomaly detection ...
Data center management: best practices for attracting enterprise clients
(written with Dan Bloom) Data centers are critical facilities that house computers, storage, and systems, which are all crucial for the daily operation of any modern business. There is currently a trend ...
5 Ways to Get the Most From Your PAM Program
As awareness around privileged access management builds, enterprises should also put thought into architecting an effective PAM program with a risk-based approach While privileged access management (PAM) has garnered significant attention in ...
Cyberhaven Applies Behavioral Analytics to Better Secure Data
Fresh off raising an additional $13 million in financing, Cyberhaven has launched a tool that enables cybersecurity teams to track how data is being moved across an extended enterprise. Cyberhaven CEO Volodymyr ...

