Category: News
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, connected devices, email traffic and new technologies in […]An Anatomy of a Public Cloud Compromise
In many ways, the public cloud is more secure than a traditional data center. And yet, assets on the public cloud are compromised all the same. To learn why, let’s […]Forcepoint NGFW and Azure Virtual WAN Integration Now Available
Azure Virtual WAN Forcepoint NGFW and Azure Virtual WAN Integration Guide Forcepoint NGFW Azure Virtual WAN is a networking service that brings many networking, security, and routing functionalities together to […]Corporate Citizenship in 2020: Our Opportunity to Be More
In 2020, corporate citizenship has never been more important, or more meaningful. At OpenText, we believe that information has the power to create a more equitable, just and democratic world, […]Calling All Hunters: FireEye Announces Bug Bounty Program
As security researchers and front-line defenders, we at FireEye understand the importance of investigating and responding to security issues. We also understand that—despite our best efforts—we cannot eradicate all security […]The Future of Security: Lessons from Black Hat USA
For the last 23 years, Black Hat has been the world’s leading information security event where attendees are able to experience the latest security research, development, and trends. While 2020 […]How We’re Using AI to Usher in the Era of the “Smarter SOC”
Businesses are having to deal with two crises simultaneously—the impact of a global recession and the acceleration of malicious cyber activity. With hundreds of thousands—often even millions—of data points streaming […]COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that had been accessed by a threat actor using […]Phish Found in Proofpoint-Protected Environments – Week Ending August 2, 2020
Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments […]Ep.6: Cem Uçtum – Titus Talks Cybersecurity Podcast
Jason Hodgert · Tuesday, August 11th, 2020 In this episode, Jason brings Sebastien Roques back to have a discussion with Cem Uçtum, from Detech, a Titus partner and Value-added distributor […]Load More