Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.
Cybereason is carrying out its third round of layoffs in 21 months, and dozens of senior employees are expected to be let go. Among the exiting employees is Zohar Alon, the longtime Dome9 Security leader who joined Cybereason just 11 months ago as president of product and research and development.
SaaS Security is often overlooked, as it's a shared security model that many organizations fail to account for. Since organizations are tasked with ensuring their SaaS Platforms are secure from breaches and adversaries, it’s paramount that IT teams understand what they are up against.
Watch us for an exclusive...
Carbon Black won't be getting a new residence anytime soon after indications of interest in the organization fell short of Broadcom's expectations. The semiconductor giant had been looking to fetch $1 billion for the security firm - including debt - but offers at that dollar figure remained elusive.
Takedowns aren't always forever in cyberspace. Months after a U.S. law enforcement operation dismantled the notorious Qakbot botnet, security researchers said signs are pointing to a resurgence. Someone with access to the Qakbot - also known as Qbot - source code is experimenting with new builds.
Managed Detection and Response (MDR) can be used to rapidly detect, investigate, and respond to unauthorized and/or suspicious activity; offer assurance that adversaries have not gained access via threat hunting; and recommend actions to improve overall security posture.
Read this Overview and learn:
How Security...
A dynamic and evolving threat landscape requires constant innovation and continued investment in technology to stop threats in near-real time.
EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections.
Download this report and learn:
The standard...
Cyberthreats are becoming more sophisticated and aggressive, but not every organization has the resources to tackle these threats. Managed detection and response (MDR) services have become an integral part of the modern security strategies as they help improve onsite resources and security program maturity.
This...
Static processes that don’t adapt to rapidly changing trends and environments — such as cloud and remote work — quickly become stale and ineffective. Security analysts are charged with the near-impossible task of triaging a never-ending deluge of security alerts, but they often receive limited training and...
Ransomware attacks have continued to dominate headlines, and they’re constantly becoming more sophisticated.
How has ransomware evolved since it was first recognized around 2005? Who is now more vulnerable to these attacks? What are the top recommendations to mitigate and prevent ransomware?
Download the white...
For Round 4 of the MITRE ATT&CK® Evaluations, 30 vendors participated to see how their solutions stacked up in defending against modern threats.
This e-book provides a comparative look at how vendors performed across various measures, with guidance on how to explore the results further.
Download the e-book to...
Many government and higher ed organizations are focusing on log management to reduce risk, accelerate remediation, and comply with regulations. But logging can come with challenges, such as difficulties ingesting data, slow access to historical data, and tool sprawl.
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
If "time is money," why spend it on all of those little tasks in a SOC that can add up, eating away at valuable workday hours? Automating these repetitive, low-level activities can free up valuable time so you can focus on more strategic initiatives, such as threat hunting and improving the overall security...
BlackBerry will split its $418 million cybersecurity business and $206 million IoT business into separate, independently operated entities following a strategic review that lasted five months. The split will help shareholders clearly evaluate the performance and future potential of each business.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.