Cyber Security The 7 Top Cybersecurity Conferences for 2022 Mar 10, 2022 cyberdefensemagazine.com While there are many more cybersecurity tradeshows events and gatherings these are my seven favorite for 2022 in […] The…
Cyber Security Diversified Search Group Acquires Alta Associates Mar 4, 2022 darkreading.com The firm continues rapid growth with the addition of industry-recognized experts on cybersecurity, data privacy, and IT risk management talent.
Cyber Security Vade Releases 2021 Phishers’ Favorites Report Mar 4, 2022 darkreading.com Vade's annual phishing report reveals a sharp rise in Facebook phishing and growing sophistication in Microsoft phishing attacks.
Cyber Security Palo Alto Networks Introduces PAN-OS 10.2 Nebula Mar 3, 2022 darkreading.com Software collects, analyzes, and interprets potential zero-day threats in real time using inline deep learning.
Cyber Security Beyond the Hype: AI’s Future in Defensive Cybersecurity Mar 1, 2022 darkreading.com Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.
Cyber Security Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques Feb 28, 2022 darkreading.com The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future…
Cyber Security Companies Borrow Attack Technique to Watermark Machine Learning Models Feb 28, 2022 darkreading.com Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up…
Cyber Security Putting the X Factor in XDR Feb 25, 2022 darkreading.com While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin…
Cyber Security Where AI Falls Down in Cybersecurity Feb 16, 2022 darkreading.com Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.
Cyber Security How to Make Cybersecurity Effective and Invisible Feb 15, 2022 darkreading.com Cybersecurity should be a shield that protects the business, not a barrier that holds it back.
The 7 Top Cybersecurity Conferences for 2022
While there are many more cybersecurity tradeshows events and gatherings these are my seven favorite for 2022 in […] The…
Diversified Search Group Acquires Alta Associates
The firm continues rapid growth with the addition of industry-recognized experts on cybersecurity, data privacy, and IT risk management talent.
Vade Releases 2021 Phishers’ Favorites Report
Vade's annual phishing report reveals a sharp rise in Facebook phishing and growing sophistication in Microsoft phishing attacks.
Palo Alto Networks Introduces PAN-OS 10.2 Nebula
Software collects, analyzes, and interprets potential zero-day threats in real time using inline deep learning.
Beyond the Hype: AI’s Future in Defensive Cybersecurity
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.
Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques
The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future…
Companies Borrow Attack Technique to Watermark Machine Learning Models
Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up…
Putting the X Factor in XDR
While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin…
Where AI Falls Down in Cybersecurity
Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.
How to Make Cybersecurity Effective and Invisible
Cybersecurity should be a shield that protects the business, not a barrier that holds it back.