Security News

IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their organization’s intent...

Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and...

Worst brew than that time El Reg went on a road trip and stopped at a Denny's IBM has issued a security alert over five vulnerabilities in its golden boy Watson analytics system.…

RSA unveiled the newest version of its market-leading SIEM, RSA NetWitness Platform, which features machine learning models based on deep endpoint observations to rapidly detect anomalies in...

Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and...

BlackBerry Cylance, the company that resulted from BlackBerry’s acquisition of Cylance, on Tuesday introduced CylancePERSONA, a proactive endpoint behavioral analytics solution. read more


Gurucul, a leader in behavior based security and fraud analytics technology, announced a new version of its Gurucul Risk Analytics (GRA) platform, which extends behavior based security analytics...

BitSight, the Standard in Security Ratings, announced the availability of BitSight Peer Analytics, the latest Security Performance Management offering on the BitSight platform. Leveraging the...

The campaign is marked by a significant level of customization, with an “individualized yet very consistent approach to every compromise.