The Latest in IT Security

Posts Tagged ‘threats’

One in ten FTSE 350 companies said they operate without a response plan for a cyber incident, and 31 percent of boards receive comprehensive cyber risk information. There has been progress in some areas when compared with last year’s health check, with more than half of company boards now setting out their approach to cyber risks;

Read more ...

The Faketoken Trojan has existed for a long time, and it has been upgraded for many years. Our experts named the current version “Faketoken.q,” and by now it has learned a significant number of tricks.

Read more ...

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package rigid algorithms. Sqrrl Enterprise 2.8 introduces the ability for analysts to easily create new hunting analytics without writing any code or having any data science skills.

Read more ...

Categories

WEDNESDAY, AUGUST 23, 2017

Featured

Archives

Latest Comments

Social Networks