More
    HomeSecurity

    Security

    ExtraHop Applies Machine Learning to Identify Anomalies in Real...

    There’s a lot of value in being able to analyze massive amounts of data to better identify anomalies across...

    Morphisec: Rethinking Endpoint Security

    I’ve been in, around, or covering security products ranging from physical tools to cyber security tools for much of...

    Sophos to Apply Advanced Algorithms to Endpoint Security

    Later this year, Sophos plans to deliver an ensemble of endpoint security technologies that will be infused with machine...

    Majority of Organizations Don’t Have Risk Management Plan

    About one in five organizations within the banking and insurance industry feel confident they can detect a data breach,...

    Malware Infections Have Geographic Boundaries

    Where you live and work could affect your risk of a malware infection.According to ESG, if you live in...

    Despite EMV Roll Out, Credit Card Related Identity Fraud...

    We know that the number of data breaches has risen substantially over the past year, as has the number...

    Cisco Updates Tetration to Automatically Apply Security Policies to...

    Last year, Cisco announced it was making use of agent software, machine learning algorithms and Big Data to apply...

    Exabeam Marries Analytics App to SIEM Platform

    Many IT organizations have invested in security information and event management (SIEM) platforms only to discover that they’ve essentially...

    Latest Articles