On-demand webinar: Experts discuss the ways an attacker can slip by your security defenses
On-demand webinar: Experts discuss the ways an attacker can slip by your security defenses
read more
Santa Clara, CA - February 9, 2015 – Seculert, the leader in advanced breach detection, today announced it has earned recognition as one of the Coolest Cloud Security Vendors as a part of The Channel Company's CRN 100 Coolest Cloud Computing Vendors of 2015. This annual list recognizes some of the most innovative cloud companies supporting the IT channel today.
read more
Cloud security platforms are helping organizations mitigate risks associated with using cloud-based applications and services. They can provide strong data protection capabilities, incorporating data loss prevention and data encryption and tokenization. A group of vendors provide identity and access management capabilities. Others monitor cloud-based systems for suspicious activity and provide a mechanism for policy enforcement, reporting and alerting. Some vendors are also pushing the envelope, providing SaaS-based tools for managing incident response activities, a cloud-based sandbox to analyze and identify advanced threats or track and control employee laptops, smartphones and tablets regardless of their location.
read more
On-demand webinar: Listen in as the experts at Seculert walk through the SONY network breach.
read more
On-demand webinar: Listen in as the experts at Seculert walk through 3 real-world infections.
read more
Learn how your corporation can definitively identify APTs that are already within your network...
read more
Was the devastating attack on Sony strictly an inside job? Or did North Korean hackers somehow gain both the expertise and the access to carry out one of the biggest cyberheists in history? "That North Korea is involved seems implausible," said Sean Sullivan, a security advisor at F-Secure, "but we now live in interesting times, so that theory can no longer be dismissed out of hand."
A cyber threat that first reared its ugly head back in 2008 continues to evolve in some of today’s malware.
An Acquisition is Akin to a Rollercoaster Ride
Feb 15, 2017 9:32:37 PMLet’s Hack an Election, Shall We?
Nov 2, 2016 1:55:28 AMNymaim: Deep Technical Dive - Adventures in Evasive Malware
Oct 11, 2016 3:30:00 PMOn-demand webinar: Experts discuss the ways an attacker can slip by your security defenses
On-Demand Webinar
Topics: News & Media, Events
Santa Clara, CA - February 9, 2015 – Seculert, the leader in advanced breach detection, today announced it has earned recognition as one of the Coolest Cloud Security Vendors as a part of The Channel Company's CRN 100 Coolest Cloud Computing Vendors of 2015. This annual list recognizes some of the most innovative cloud companies supporting the IT channel today.
Topics: Press Releases
UNITED STATES SENATE
Cloud security platforms are helping organizations mitigate risks associated with using cloud-based applications and services. They can provide strong data protection capabilities, incorporating data loss prevention and data encryption and tokenization. A group of vendors provide identity and access management capabilities. Others monitor cloud-based systems for suspicious activity and provide a mechanism for policy enforcement, reporting and alerting. Some vendors are also pushing the envelope, providing SaaS-based tools for managing incident response activities, a cloud-based sandbox to analyze and identify advanced threats or track and control employee laptops, smartphones and tablets regardless of their location.
Topics: News & Media, In the Media
On-demand webinar: Listen in as the experts at Seculert walk through the SONY network breach.
On-demand webinar: Listen in as the experts at Seculert walk through 3 real-world infections.
Learn how your corporation can definitively identify APTs that are already within your network...
Topics: Resources, White Papers
Was the devastating attack on Sony strictly an inside job? Or did North Korean hackers somehow gain both the expertise and the access to carry out one of the biggest cyberheists in history? "That North Korea is involved seems implausible," said Sean Sullivan, a security advisor at F-Secure, "but we now live in interesting times, so that theory can no longer be dismissed out of hand."
Topics: News & Media, In the Media
A cyber threat that first reared its ugly head back in 2008 continues to evolve in some of today’s malware.
Topics: News & Media, In the Media