Category: News
Micro Focus Completes Acquisition of Interset
Latest Acquisition Brings Advanced Machine Learning and User and Entity Behavioral Analytics (UEBA) to an Already-Deep Security, Risk & Governance Portfolio Micro Focus (LSE: MCRO; NYSE: MFGP) today announced the […]Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign
Introduction FireEye devices detected intrusion attempts against multiple industries, including think tank, law enforcement, media, U.S. military, imagery, transportation, pharmaceutical, national government, and defense contracting. TheSuccess Story: Inphi drives engineering design efficiency with simplified IT infrastructure with OpenText
Headquartered in Santa Clara, California, Inphi is a leader in high-speed data movement, providing its customers with sleek semiconductor solutions to move data around inside and between data centers. With around 580 design engineers andBiometrics and 2FA
By Paul Foley, Versasec, Professional Services Director, Founder One set of fingerprints. One set of retinas. That's all we have. Using them and other biometric factors such as palm prints, voice and facial recognition as forms ofConfused about Cybersecurity Platforms? We Can Help.
“Cybersecurity platform” continues to be an industry buzzword. Vendors talk about it at industry events, and many analysts. But can every vendor claim to offer a platform and also be credible? More importantly, how does that help your business?Announcing the New Future-Oriented Data Center Firewall X9180!
The Hillstone X10800 has been proved to be a successful platform. Today, we are excited to announce the release of the X9180 Data Center Firewall that shares the same innovative, fully distributed architecture as the X10800, with smaller formObfuscated Command Line Detection Using Machine Learning
This blog post presents a machine learning (ML) approach to solving an emerging security problem: detecting obfuscated Windows command line invocations on endpoints. We start out with an introduction to this relatively new threat capability, andShould non-EMV transactions be phased out completely? An analysis of TinyPOS
For the last year Forcepoint X-Labs has been collecting samples of Point-of-Sale (POS) malware that stood out for their hand-crafted nature, were written in assembly code and were very small in size (2-7kB). In this blog we shall examine the7 Tips to Make Windows Updates Error-Proof Instead of Error-Prone
Skip to main content PC users continue to experience “good news/bad news” scenarios when it comes to updating Windows 10. In case you missed it, Microsoft issued a warning last Friday to alert users that they might experience issues with theThe Complete Guide to Network Packet Brokers
How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.Load More