BlackBerry will split its $418 million cybersecurity business and $206 million IoT business into separate, independently operated entities following a strategic review that lasted five months. The split will help shareholders clearly evaluate the performance and future potential of each business.
What do "bank transfer request.lnk" and "URGENT-Invoice-27-August.docx.lnk" have in common? Both are the names of malicious files being sent as part of a phishing campaign attributed to the Qakbot botnet group that has continued despite law enforcement disrupting Qakbot's operations in late August.
Organizations have relied on disjointed technologies and tools that focus on individual security layers for too long. To stay ahead of threat actors, it is time to change the way we approach security.
This paradigm shift requires us to embrace the next era of cybersecurity that combines human intelligence with AI...
Welcome to the report summarizing this industry survey, conducted in Q1 and 2, 2023. It attracted 150 responses
from senior cybersecurity professionals at manufacturing
operations globally.
We benchmark where the pain points are for
defenders and what organizations are doing to overcome these
issues, the extent...
SentinelOne CEO Tomer Weingarten hit back at endpoint security rivals CrowdStrike and Microsoft and rumored M&A suitor Wiz for publicly fanning acquisition flames. The endpoint security firm called Wiz acquisition rumors "a head-scratcher," "far from fact" and "pure speculation on their part."
Malwarebytes laid off at least 100 workers this week and plans to split its consumer and corporate-facing business units into separate companies. The antivirus firm cut also recently axed its chief product officer, chief information officer and chief technology officer.
CrowdStrike CEO George Kurtz said point product companies "are quickly going the way of legacy antivirus" as rivals SentinelOne and BlackBerry reportedly hunt for buyers. The endpoint security market is quickly consolidating from being "littered with dozens of companies" to having several vendors.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alex Waintraub, DFIR expert evangelist at CYGNVS, discusses how generative AI will play a role in the future of incident response - and in all aspects of cybersecurity - and emphasizes its dangers as well as its benefits.
Unnecessary cyber alerts are a threat that can overwhelm defenders, leading to burnout and reduced efficiency within the team. Chris Waynforth, vice president and general manager at Expel, said adopting automation solutions to filter and prioritize alerts allows for more effective incident response.
In a world accustomed to multiple, fragmented technologies and point solutions, organizations need a unified approach that supports endpoint security and management across heterogeneous devices and operating systems. They need fast deployment and rapid time to value, in both the cloud and on-premise implementations....
Cyberattacks are proliferating rapidly and growing in scope as adversaries move laterally across the network and traverse diverse environments. As the Security Operations Center (SOC) works to deal with the increasing threat, they can find themselves overwhelmed by an unacceptably high level of false positives,...
The threat landscape continues to evolve as malicious actors quickly adapt to the changing environment and are finding new ways to exploit your vulnerabilities. It is now more critical than ever to protect your workforce at the endpoint no matter where you are.
Legacy endpoint security tools have proven to be...
While extended detection and response (XDR) adoption is still in its early phase, interest is high among many organizations, as they believe that this targeted detection approach can lead to higher- quality response prioritization.
To understand this more, VMware commissioned Forrester Consulting to survey over...
The modernized SOC is built on XDR, deployed in conjunction with many of the technologies already used by SOC teams, supportive of the proven processes already in place, and removes operational friction from the working environment.
Today we can no longer safely assume that SIEM/SOAR tools and EDR are enough in and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.