Say hello to NortonLifeLock, as Symantec anti-virus for consumers is no more, following the sale of Symantec's enterprise assets and name to Broadcom for $10.7 billion. But can the new, pure-play consumer "cyber safety" business succeed where the combined consumer and enterprise business previously stumbled?
With all of the tools deployed for
endpoint detection and response,
enterprises today are often overwhelmed
by threat intelligence, says J.J. Thompson
of Sophos. To alleviate "analysis
paralysis," Sophos has launched its
Managed Threat Response service.
Download this eBook to learn more about:
The evolution of...
The cybersecurity community had been holding its breath in anticipation of mass attacks targeting the severe BlueKeep vulnerability in Windows, which Microsoft has patched. The first in-the-wild exploits have now been seen, although they don't appear to constitute an emergency - at least yet.
Using the largest repository of breached credentials in the world, SpyCloud has analyzed breach data tied to Fortune 1000 employees to understand what information is out there and how it can be used to commit fraud. In this video, SpyCloud Head of Product Strategy Chip Witt will walk through SpyCloud's analysis of...
Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance.
FCC Chairman Ajit Pai is pushing a proposal that would ban U.S. telecommunications firms from using commission funds to buy equipment from companies deemed national security threats. The new rule would first target Chinese telecom companies Huawei and ZTE.
Facebook is suing NSO Group, a spyware company, alleging it developed a potent exploit to spy on WhatsApp messages sent by diplomats, journalists, human rights activists and political dissidents. Facebook is seeking damages and an injunction forbidding NSO Group from accessing its infrastructure.
What is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl". Enterprises are now awakening to this challenge and attempting to overcome it.
Download this eBook to learn more about:
How "tool sprawl" has created industry fatigue;
The resulting loss of visibility;
The use of new standards can help strengthen cybersecurity risk management of medical devices at the Department of Veterans Affairs as well as other healthcare organizations, says Anura Fernando of UL, which recently completed a study with the VA examining gaps in medical device cybersecurity approaches.
To deploy faster and easier cloud native applications, enterprises are challenged to establish a different IT consumption model while providing classical IT services.
This webinar will help you further develop your strategy for cloud native applications and container platforms. As in our previous webinar, we will...
What is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl," say Brian Murphy and Seth Goldhammer of ReliaQuest. Enterprises are now awakening to this challenge and attempting to overcome it.
Although a challenge, comprehensive data protection is possible and key to keeping
your company's most crucial assets protected in both physical and virtual environments.
An independent analysis of global organisations and their data protection readiness
reveals that a vast majority nearly 82% must transform their...
Data is transforming the way we live and work and has become a catalyst for innovation in our economy. IDC predicts that 50% of global GDP will be digitalised by 2021. Data powers digital transformation. Those organisations who can harness their data capital are poised to succeed.
Wealth in the form of value...
As organizations move increasing numbers of workloads
to distributed, multicloud environments and adopt
connectivity-dependent trends such as the Internet of
Things, the simpler networks of yesterday have steadily
morphed into something considerably more complex. It's
this growing complexity that is the ultimate...
The modern cybersecurity landscape is rapidly and continually
evolving with new, sophisticated malware and attack
techniques that threaten enterprises on a massive scale.
At the same time, enterprise networks have become increasingly
complex with multi-cloud and multi-vendor solutions
that expand the boundary...