AI Vectra Funding

Vectra Raises $100M More for Cybersecurity AI

Vectra has garnered another $100 million in funding to accelerate development of a threat detection and response system running in the cloud that makes extensive use of artificial intelligence (AI). This latest ...
Security Boulevard
How to Break Broken SOC Cycles

How to Break Broken SOC Cycles

We’ve all heard the same buzzwords used to describe the current situation in security operation centers (SOCs). Among them are “alert fatigue,” “labor crunch,” the “skills gap,” “high turnover” and “missing advanced ...
Security Boulevard
Taming Network Chaos By Understanding User Behavior

Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable ...
Evolving Impact of Cybersecurity Threats

The Evolving Impact of Cybersecurity Threats

As security threats evolve and adapt, so, too, must organizations’ response to them Infosec spending is on track to reach $124 billion this year. According to research firm Gartner, this marks an ...
Security Boulevard
WhiteHat Security Enlists Rural Sourcing to Close DevSecOps Gap

WhiteHat Security Enlists Rural Sourcing to Close DevSecOps Gap

WhiteHat Security this week announced it has formed a technology alliance with Rural Sourcing Inc. (RSI) to close the gap between when application vulnerabilities discovered and remediated. Matthew Hutchinson, vice president of ...
Security Boulevard
Brute Force Attacks: Denying the Attacker, Not the User

Brute Force Attacks: Denying the Attacker, Not the User

According to haveIbeenpwned.com, close to 8 billion accounts have been compromised. The site provides a tool to see if any of your passwords have been compromised and are available on the dark-net ...
Tripwire state of cyber hygiene report stats

Managed Vulnerability Management? Yes, You Read That Right

The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can ...
Catching Bloodhound Before it Bites

Catching Bloodhound Before it Bites

BloodHound is a public and freely available tool that uses graph theory to automate much of the confusion behind understanding relationships in an Active Directory (AD) environment. It allows hackers and pentesters ...

Defending our Digital Homeland: Preventive Control Is Only The Beginning

Sir Winston Churchill spoke of fighting wherever and whenever to defend the homeland. The battle we face now in securing networks requires that same broad approach of defending and fighting everywhere we ...

UEBA and Evolved SIEM ? Foundations of the Intelligent SOC

Using the analogy of a driverless vehicle, the role of UEBA in your security platform is explored. Find out how analytics based on patterns and unusual behavior help security analysts target threats, ...
Loading...