Many government and higher ed organizations are focusing on log management to reduce risk, accelerate remediation, and comply with regulations. But logging can come with challenges, such as difficulties ingesting data, slow access to historical data, and tool sprawl.
BlackBerry will split its $418 million cybersecurity business and $206 million IoT business into separate, independently operated entities following a strategic review that lasted five months. The split will help shareholders clearly evaluate the performance and future potential of each business.
What do "bank transfer request.lnk" and "URGENT-Invoice-27-August.docx.lnk" have in common? Both are the names of malicious files being sent as part of a phishing campaign attributed to the Qakbot botnet group that has continued despite law enforcement disrupting Qakbot's operations in late August.
Welcome to the report summarizing this industry survey, conducted in Q1 and 2, 2023. It attracted 150 responses
from senior cybersecurity professionals at manufacturing
We benchmark where the pain points are for
defenders and what organizations are doing to overcome these
issues, the extent...
SentinelOne CEO Tomer Weingarten hit back at endpoint security rivals CrowdStrike and Microsoft and rumored M&A suitor Wiz for publicly fanning acquisition flames. The endpoint security firm called Wiz acquisition rumors "a head-scratcher," "far from fact" and "pure speculation on their part."
Malwarebytes laid off at least 100 workers this week and plans to split its consumer and corporate-facing business units into separate companies. The antivirus firm cut also recently axed its chief product officer, chief information officer and chief technology officer.
CrowdStrike CEO George Kurtz said point product companies "are quickly going the way of legacy antivirus" as rivals SentinelOne and BlackBerry reportedly hunt for buyers. The endpoint security market is quickly consolidating from being "littered with dozens of companies" to having several vendors.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alex Waintraub, DFIR expert evangelist at CYGNVS, discusses how generative AI will play a role in the future of incident response - and in all aspects of cybersecurity - and emphasizes its dangers as well as its benefits.
Unnecessary cyber alerts are a threat that can overwhelm defenders, leading to burnout and reduced efficiency within the team. Chris Waynforth, vice president and general manager at Expel, said adopting automation solutions to filter and prioritize alerts allows for more effective incident response.
In a world accustomed to multiple, fragmented technologies and point solutions, organizations need a unified approach that supports endpoint security and management across heterogeneous devices and operating systems. They need fast deployment and rapid time to value, in both the cloud and on-premise implementations....
Innovations in generative AI have accelerated, with applications across large language models, image and video generation, and audio/voice. Organizations want to know how these developments change the cyber threat landscape. In this discussion, we will talk about the risks generative AI poses and how to prepare for...
Organizations are challenged to reduce their endpoint security risk. Damage may come from disruption of business operations and/or extortion. And as many victims will attest, ransomware does not stop at the endpoint but seeks to propagate deeper into organizations, for more valuable data.
CrowdStrike has focused on bringing its extended detection and response technology to users with less expensive devices such as Chromebooks by adding support for Google's ChromeOS. The pact will give CrowdStrike clients greater visibility into the security posture and compliance of ChromeOS devices.
In a world accustomed to multiple, fragmented technologies and point solutions, organizations need a unified approach that supports endpoint security and management across heterogeneous devices and operating systems.
This buyer’s guide:
Lists capabilities that characterize an effective endpoint management...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?