Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been ...
We are the Defenders. The first to your fight.

Cybereason Backs Its Protection with $1 Million Breach Protection Warranty

Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver ...

How far does endpoint detection and response (EDR) take you to complete threat intelligence?

Lots of new cyber vendors are starting up all the time. Crunchbase’s list of top cybersecurity startups  is 1,089 businesses long. What you find is that everyone is specialized in their own ...
Zerologon

IT’s Confidence in Mitigating Cyberthreats Low

As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of ...
Security Boulevard

APT Mercenary Groups Pose Real Threat to Companies But Detecting Tactics and Techniques is Within Reach

| | APT, EDR
Bitdefender identified a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service The targeted company is engaged in architectural projects with billion-dollar luxury real-estate developers in New York, London, Australia and Oman ...
Corelight Splunk App update: new dashboard and data

Corelight Splunk App update: new dashboard and data

By Roger Cheeks, US-East Sales Engineer, Corelight In support of Corelight’s latest software release, v19, we are pleased to launch our newest installment of the Corelight App for Splunk (Corelight App) and ...

Network Security Monitoring data: Types I, II, and III

By Richard Bejtlich, Principal Security Strategist, Corelight Some critics claim that ever growing encryption renders network security monitoring useless. This opinion is based on a dated understanding of the types and values ...

8 Key Capabilities Managed Security Service Providers Need from their Endpoint Detection and Response Platform

Endpoint devices represent a significant attack surface for most enterprises. Many businesses don’t have the resources or the expertise to thoroughly monitor their own endpoints and to promptly respond as needed when ...
Video Q&A: Why Do Endpoint Security Tools Fail To Detect Threats and Prevent Compromises?

Video Q&A with Senior InfoSec Analyst Aaron Sherrill: Discussing MDR Security Services

We recently had the pleasure of connecting with 451 Research Senior Analyst in Information Security, Aaron Sherrill, for a video Q&A session. The topic of conversation was endpoint security — specifically, questions ...
Gilad Maayan

Endpoint Detection and Response: Securing Your Borders

The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI ...