This 2024 threat-hunting report, highlights the trends observed in the past 12 months. Also, it talks about how to utilize proactive, intelligence-informed threat hunting to relentlessly track, detect, and ultimately disrupt the adversary no matter when or where they operate.
Learn how modern adversaries are...
As Cylance continues to incur significant losses, BlackBerry is reallocating resources toward its more promising QNX and secure communications teams. The company expects its cybersecurity unit to stabilize and become profitable by the end of the fiscal year, thanks to strategic bets and cost cuts.
In today's digital-first world, endpoints are the frontline of defense against cyber threats. As the complexity and frequency of attacks increase, organizations must prioritize endpoint protection to safeguard their data, networks, and reputation.
To understand the state of endpoint security in the DACH region, we...
SentinelOne's minimal reliance on the kernel, reduced dependency on cloud connectivity and use of behavioral AI for threat detection reduce the risk of system disruptions and offer a security edge over CrowdStrike, said SentinelOne CEO Tomer Weingarten.
CrowdStrike, in a preliminary report, has blamed internal testing problems for failing to prevent the faulty "rapid content update" that caused worldwide disruption on Friday. The cybersecurity vendor has promised to refine its testing and deployment processes to avoid any repeats.
George Kurtz said CrowdStrike's Falcon platform is leading the way in cybersecurity consolidation, with deals involving cloud, identity or SIEM doubling year-over-year. Customer are seeing significant cost savings and faster response times, which Kurtz said has solidified CrowdStrike's position.
ThreatLocker completed a $115 million Series D funding round to further its zero trust cybersecurity ambitions. The Orlando-based company plans to use the funding to expand the number of applications it supports and prepare for a potential initial public offering.
Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.
Cybereason is carrying out its third round of layoffs in 21 months, and dozens of senior employees are expected to be let go. Among the exiting employees is Zohar Alon, the longtime Dome9 Security leader who joined Cybereason just 11 months ago as president of product and research and development.
Carbon Black won't be getting a new residence anytime soon after indications of interest in the organization fell short of Broadcom's expectations. The semiconductor giant had been looking to fetch $1 billion for the security firm - including debt - but offers at that dollar figure remained elusive.
Venture capital investor Pramod Gosavi discussed the drawbacks of relying on network-centric cybersecurity solutions that are driving up costs. He recommended proactive strategies, such as zero trust, that emphasize minimal access and continuous verification and investments in AI-based technologies.
For Round 4 of the MITRE ATT&CK® Evaluations, 30 vendors participated to see how their solutions stacked up in defending against modern threats.
This e-book provides a comparative look at how vendors performed across various measures, with guidance on how to explore the results further.
Download the e-book to...
A dynamic and evolving threat landscape requires constant innovation and continued investment in technology to stop threats in near-real time.
EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections.
Download this report and learn:
The standard...
Managed Detection and Response (MDR) can be used to rapidly detect, investigate, and respond to unauthorized and/or suspicious activity; offer assurance that adversaries have not gained access via threat hunting; and recommend actions to improve overall security posture.
Read this Overview and learn:
How Security...
Static processes that don’t adapt to rapidly changing trends and environments — such as cloud and remote work — quickly become stale and ineffective. Security analysts are charged with the near-impossible task of triaging a never-ending deluge of security alerts, but they often receive limited training and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.