Security News
Corelight aims to help large organizations improve incident response and threat hunting capabilities
Corelight, provider of the most powerful network visibility solution for cybersecurity, expanded its product portfolio with the launch of the Corelight Fleet Manager, designed to accelerate the...
Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more sophisticated. The phishing...
Radiflow, a leading provider of industrial cybersecurity solutions for industrial automation networks, announced that the company has added dynamic vulnerability assessment scoring capabilities in...
Learn how to make threat hunting a repeatable process that drives better security outcomes.What is required to take your threat hunting program to the highest level of maturity?
Notice this bit from an article on the arrest of Christopher Hasson: It was only after Hasson's arrest last Friday at his workplace that the chilling plans prosecutors assert he was crafting...
ShieldX, the leader in elastic security, announced Transport Layer Security (TLS) 1.3 support for the company’s Elastic Cloud Security platform. With this update, ShieldX provides customers with...
Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.
Times are strange when spies talk about infosec and economics colliding The world must "understand the opportunities and threats from China's technological offer", GCHQ director Jeremy Fleming...
Backdoors, cryptomining, fake apps, and banking Trojans increased substantially in the past year, according to McAfee. Here's how to protect your business.
ISARA, the leading provider of agile quantum-safe security solutions, announced new and updated tools that make it easy to test and implement crypto-agility and quantum-safe cryptography directly...