Tag "Threat Intelligence"

Back to homepage
Software

A Hackers Take On Blockchain Security

One of the leading factors of the blockchain—aside from the obvious decentralization—is the high level of security behind it. It’s not uncommon to hear people claim that it is “unhackable.”

IT Compliance

11 Expert Takes On Data Privacy Day 2019 You Need To Read

The Council of Europe agreed that January 28 should be declared European Data Protection Day back in 2007; two years later the U.S. joined in with the Data Privacy Day

Software

Understanding how data becomes intelligence is central for any successful security program

Threat intelligence is one of the hottest terms in information security at the moment. But, as with so many buzzwords, it is often overused and misused. All the buzz has created

Software

Cybercriminals using combination of Vidar Infostealer Malware and GandCrab Ransomware in single attack

Hearing the phrase “high-level threat intelligence”, the immediate reaction for many people would be to think of elite security analysts employed only by secretive government organisations and the world’s largest

Hardware/Network

How organisations can start using threat intelligence to boost their security

Hearing the phrase “high-level threat intelligence”, the immediate reaction for many people would be to think of elite security analysts employed only by secretive government organisations and the world’s largest

Industry Insights

How to Integrate Business Security Systems

When choosing a business security system, you don’t want to leave anything to chance. In addition to having a system that gives you the best protection, you need it to

Industry Insights

How to Integrate Business Security Systems

When choosing a business security system, you don’t want to leave anything to chance. In addition to having a system that gives you the best protection, you need it to

Hardware/Network

Criminal Charges Filed in DDoS-for-Hire Services

Efforts to take down multiple domains that offered distributed denial-of-services (DDoSs) for hire were successful and resulted in another announcement from the Justice Department (DOJ), which yesterday declared that it had

Hardware/Network

Overcoming Common SD-WAN Security Mistakes

Digital transformation is about much more than moving workflows to the cloud and adopting IoT. It is about retooling the entire network to make it faster, more efficient, much more

Hardware/Network

Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Almost every day, there seems to be a new headline about a high-profile data compromise. But the incidents we hear about only make up the tip of the iceberg —