by Liora |
Jan 28, 2015 3:10:01 PM |
0 Comments
Cloud security platforms are helping organizations mitigate risks associated with using cloud-based applications and services. They can provide strong data protection capabilities, incorporating data loss prevention and data encryption and tokenization. A group of vendors provide identity and access management capabilities. Others monitor cloud-based systems for suspicious activity and provide a mechanism for policy enforcement, reporting and alerting. Some vendors are also pushing the envelope, providing SaaS-based tools for managing incident response activities, a cloud-based sandbox to analyze and identify advanced threats or track and control employee laptops, smartphones and tablets regardless of their location.
read more
by Liora |
Jan 25, 2015 3:15:09 PM |
0 Comments
On-demand webinar: Listen in as the experts at Seculert walk through the SONY network breach.
read more
by Liora |
Dec 10, 2014 10:23:49 AM |
0 Comments
On-demand webinar: Listen in as the experts at Seculert walk through 3 real-world infections.
read more
by Liora |
Dec 8, 2014 12:24:49 PM |
0 Comments
Learn how your corporation can definitively identify APTs that are already within your network...
read more
by Debbie |
Dec 6, 2014 2:26:02 PM |
0 Comments
Learn how Seculert integrates with your existing security solutions. No hardware ...
read more
by Liora |
Dec 5, 2014 6:04:47 PM |
0 Comments
Was the devastating attack on Sony strictly an inside job? Or did North Korean hackers somehow gain both the expertise and the access to carry out one of the biggest cyberheists in history? "That North Korea is involved seems implausible," said Sean Sullivan, a security advisor at F-Secure, "but we now live in interesting times, so that theory can no longer be dismissed out of hand."
read more
by Liora |
Dec 3, 2014 6:05:45 PM |
0 Comments
A cyber threat that first reared its ugly head back in 2008 continues to evolve in some of today’s malware.
read more
The Ponemon Institute’s new “2014 Global Report on the Cost of Cyber Crime” is confirming what many CISOs and other network security professionals have been saying for months: data breach costs are on the rise.
read more
by Liora |
Nov 25, 2014 6:03:33 PM |
0 Comments
Symantec's discovery of state-backed malware should serve as warning to firms.
read more
by Aviv Raff |
Nov 18, 2014 9:00:00 PM |
0 Comments
You may remember hearing about Domain Generating Algorithms, aka DGAs, from our coverage of the PushDo malware or from the malware we dubbed DGA.Changer, or more recently from our post on the Tinba Trojan. Malware threats that contain DGAs are not new, but they are more difficult to prevent and detect.
read more