TelcoNews UK - Telecommunications news for ICT decision-makers

Threat intelligence stories - Page 50

Command centre2

McAfee introduces new threat visibility and prioritisation feature

Tue, 8th Oct 2019
#
advanced persistent threat protection
#
casb
#
mcafee
McAfee MVISION Insights helps firms proactively combat cyber threats by providing tailored, actionable intelligence.
Gettyimages 956437954

Insight Partners snatches up Recorded Future for $780m

Tue, 4th Jun 2019
#
cybersecurity
#
threat intelligence
#
m&a
Insight Partners has acquired Recorded Future in a $780m deal, the largest threat intelligence acquisition to date.
Gettyimages 489345292

SEGA turns to Palo Alto Networks for cybersecurity protection

Thu, 23rd May 2019
#
gaming
#
firewalls
#
network infrastructure
SEGA Europe has partnered with Palo Alto Networks for cutting-edge cybersecurity, enhancing protection for its headquarters and five global development studios.
Gettyimages 1055542026

Leveraging cyber threat intelligence to benefit security posture

Tue, 7th May 2019
#
threat intelligence
#
threatquotient
#
security week
A recent SANS survey reveals 20% of companies are unsure of cyber threat intelligence's value, despite its crucial role in enhancing security posture.
Screen shot 2019 01 30 at 1

4 Reasons why CISOs should adopt threat intelligence

Thu, 31st Jan 2019
#
cybersecurity
#
ciso
#
threat intelligence
ThreatQuotient's Anthony Perridge believes the answer to security teams falling behind criminals is to deploy threat intelligence platforms.
Cyber protection3

Varonis updates data security offering

Thu, 24th Jan 2019
#
data privacy
#
microsoft
#
threat intelligence
Version 7.0 of the Varonis Data Security Platform features new cloud and threat detection and response capabilities.
Military intelligence

Blurred lines: How counterinsurgent strategies apply to threat hunting

Wed, 15th Aug 2018
#
endpoint protection
#
advanced persistent threat protection
#
edr
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Cyber attacker

Adopt a cyber attacker's point of view to protect data

Thu, 28th Jun 2018
#
edutech
#
supply chain
#
breach prevention
The ISACA and SecurityScorecard paper provides 11 key questions to ask to implement continuous assurance related to threat understanding.
Thinkstockphotos 624010374

Interview: RSA Security decodes digital fraud and its effects on APAC

Tue, 5th Jun 2018
#
crypto
#
fintech
#
blockchain
Digital fraud in APAC is rising as online threats evolve. RSA Security's Richard Booth highlights key risks and strategies to stay protected.
Threatquotient   anthony stitt 8qcftzh

ThreatQuotient appoints ex-Cisco security sales chief to lead APAC expansion

Wed, 23rd May 2018
#
cisco
#
threat intelligence
#
threatquotient
ThreatQuotient has chosen Australia as its Asia pacific base. Former Cisco security sales chief Anthony Stitt will lead operations.
Thinkstockphotos 921661112

SonicWall supersizes threat protection with new Capture Cloud Platform

Wed, 11th Apr 2018
#
data protection
#
endpoint protection
#
breach prevention
Winning the cyber arms race requires a consistent, agile, reputable stream of real-time cyber threat intelligence, explains SonicWall CEO Bill Conner.
Thinkstockphotos 940037718

Carbon Black launches tech partner program to improve collective security defences

Wed, 4th Apr 2018
#
siem
#
juniper networks
#
logrhythm
Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.
Thinkstockphotos 817402648

Not quick enough: Most firms can't detect or contain a breach within one hour

Wed, 28th Mar 2018
#
siem
#
breach prevention
#
cybersecurity
New research from LogRhythm reveals that fewer than half of global organisations can detect a major cybersecurity breach within one hour.
Screen shot 2018 03 07 at 3

Blueliv makes plea for cybercrime intelligence sharing across industries

Thu, 8th Mar 2018
#
malware
#
uc
#
data privacy
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.
Cybersecurity3 copy

Anti-phishing software integrates with SIEMs to secure the enterprise

Tue, 27th Feb 2018
#
siem
#
phishing
#
email security
Cofense's anti-phishing software now integrates with SIEM systems, fortifying enterprise security by automating incident response and threat intelligence.
Thinkstockphotos 845547386

Empower and mobilise your 'human sensors' to fend off phishing attacks

Tue, 27th Feb 2018
#
phishing
#
email security
#
threat intelligence
Some of the largest enterprises in the world fall victim to phishing attacks, even with the latest and greatest technologies. Why?.
Thinkstockphotos 657832898

LogRhythm SIEM gets a boost with Webroot threat intelligence & IP reputation services

Wed, 31st Jan 2018
#
siem
#
ai security
#
ai
LogRhythm and Webroot partner to enhance SIEM intelligence with IP reputation and threat intelligence services.
Thinkstockphotos 815186218

Where to focus your threat protection strategies this year

Tue, 23rd Jan 2018
#
malware
#
ransomware
#
iot
Some might think that by now organisations would have come to a point where they are a step ahead of criminals.
Fallback

Half of IT executives want to detect in-progress attacks before it's too late

Tue, 17th Oct 2017
#
advanced persistent threat protection
#
threat intelligence
#
cyber threat
Nearly half of IT executives seek real-time threat detection, reveals an RSA study, pointing to automation as a key tool to speed up response times.
Thinkstockphotos 845260736

Microsoft: Bangladesh, China assaulted by malware; Hong Kong better protected

Wed, 11th Oct 2017
#
malware
#
cybersecurity
#
microsoft
China and Bangladesh are facing more malware threats and unwanted software families than ever, while Hong Kong is staying below the radar.