Security News

Whitepaper: Maturing a Threat Intelligence Program
2019-06-13 04:15

Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand where your organization...

RH-ISAC's Role in Countering Threats
2019-06-12 21:48

Tommy McDowell, Vice President, on the Value of Information SharingIn response to large data breaches, the retail and hospitality industry formed the RH-ISAC to serve as a central hub for sharing...

Beyond Opportunistic: How the Threat Landscape Is Evolving
2019-06-12 17:18

Chester Wisniewski of Sophos Describes the 'Blended Threat'The threat landscape continues to evolve, says Chester Wisniewski of Sophos. "The more professional, the more skilled criminals out there...

When Time is of the Essence – Testing Controls Against the Latest Threats Faster
2019-06-12 14:33

A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you're protected right now. What do you do? Traditionally, you would have to go with one of the options below....

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million
2019-06-11 12:13

San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. This brings the total...

SecBI extends its threat detection solution with automated response
2019-06-11 02:00

SecBI, a disruptive player in cyber threat management, announced the extension of its agent-less, threat detection solution with automated response. Now security operations centers (SOC) and...

Fighting Fraud With Threat Intelligence: Debunking Common Misconceptions
2019-06-10 15:32

The Composition of a Fraud Team or Function is Often Overlooked in th Threat Intelligence Market read more

The Dark Net, a Major Threat but Also a Resource
2019-06-10 13:52

Criminal use of, and threats from, the dark net are growing. At the same time, criminals are going darker through direct end-to-end encryption for direct communication with service buyers and...