Security News
Revolutionary Security's portfolio of cybersecurity services includes assessment and testing, design and build of security programs and functions as well as security operations across its clients' IT and OT systems. Revolutionary Security leverages proprietary technology and methods to help mature the security capabilities of its clients and manage risk.
Much more powerful, deception technologies leverage artificial intelligence and machine learning to enable the automated deployment of fake content, lists, databases and access points that play directly into the attackers' desires and then trap them into false storage or network areas and occupy them until the threat can be contained. Deception technologies enable the sort of proactive defense strategy that the industry can easily adopt to help to reduce data breaches.
The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on...
MITRE Engenuity, a tech foundation for public good, announced the Center for Threat-Informed Defense, a collaboration with industry to improve cyber defense at scale through collaborative research...
Indegy, a leading provider of security solutions for industrial control system (ICS) and operational technology (OT) environments, and Owl Cyber Defense Solutions, the global market leader in data...
Real-time Visibility Into the Security Posture of an Enterprise is Critical for Organizations to Operate With Confidence read more
Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of packet capture The...
HolistiCyber's Moshe Ishai on How Defenders Can Close the Security GapCyber defense is no longer about staying a step ahead - it's about trying to remain no further than a step behind the...
Fortinet's FortiGuard Labs global threat research team is creating research playbooks that provide deep-dive analysis of not only threat trends, but also cybercriminal and adversary tools and...
Rep. Tom Graves, R-Ga., is reintroducing his Active Cyber Defense Bill today. He first floated the idea in March 2017, and published an updated version in May 2017. It was then, and is now, being...