EDR
Swimlane Trial Launches with McAfee's MVISION Marketplace Opening
In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been ...
Cybereason Backs Its Protection with $1 Million Breach Protection Warranty
Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver ...
How far does endpoint detection and response (EDR) take you to complete threat intelligence?
Lots of new cyber vendors are starting up all the time. Crunchbase’s list of top cybersecurity startups is 1,089 businesses long. What you find is that everyone is specialized in their own ...
IT’s Confidence in Mitigating Cyberthreats Low
As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of ...
APT Mercenary Groups Pose Real Threat to Companies But Detecting Tactics and Techniques is Within Reach
Bitdefender identified a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service The targeted company is engaged in architectural projects with billion-dollar luxury real-estate developers in New York, London, Australia and Oman ...
Corelight Splunk App update: new dashboard and data
By Roger Cheeks, US-East Sales Engineer, Corelight In support of Corelight’s latest software release, v19, we are pleased to launch our newest installment of the Corelight App for Splunk (Corelight App) and ...
Network Security Monitoring data: Types I, II, and III
By Richard Bejtlich, Principal Security Strategist, Corelight Some critics claim that ever growing encryption renders network security monitoring useless. This opinion is based on a dated understanding of the types and values ...
8 Key Capabilities Managed Security Service Providers Need from their Endpoint Detection and Response Platform
Endpoint devices represent a significant attack surface for most enterprises. Many businesses don’t have the resources or the expertise to thoroughly monitor their own endpoints and to promptly respond as needed when ...
Video Q&A with Senior InfoSec Analyst Aaron Sherrill: Discussing MDR Security Services
We recently had the pleasure of connecting with 451 Research Senior Analyst in Information Security, Aaron Sherrill, for a video Q&A session. The topic of conversation was endpoint security — specifically, questions ...
Endpoint Detection and Response: Securing Your Borders
The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI ...

