GitGuardian’s unique Honeytoken capability proactively detects and mitigates software supply chain attacks.
Search Results: threat intelligence (241)
The Wiz cloud security platform gives comprehensive control over customers’ cloud infrastructure and applications, while providing a visual ‘Graph’ of the environment.
Trend Micro’s market share is more than twice the size of its closest competitor in the cloud workload security sector, according to IDC report.
Trend Micro is integrating AI into its cybersecurity platform to empower organizations with enhanced capabilities.
There are several security risks associated with generative AI, including AI-powered social engineering attacks and evasion of traditional security defenses.
The potential of generative AI goes far beyond image generation and blog writing—it is a game-changer for staying ahead of evolving cybersecurity threats.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on mitigating multi-cloud and SaaS cybersecurity risk while enabling the business.
Get a preview of part 2 of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on obstacles to data modernization projects.
From a security perspective, AI can be used against itself within the realm of behavioral analytics and malware detection.
The Rubrik management platform provides data resilience, observability, and remediation. Find out what differentiates Rubrik.
There are unique endpoint security challenges associated with cloud-based systems. Here are some strategies to address them.
Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.
New service built specifically for managed security service providers (MSSPs) help them secure the most common mobile devices and encourages self-remediation when issues occur.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
For more than 30 years, Trend Micro has been protecting diverse devices, applications, and data. It continues to do so while also delivering high-value cybersecurity research.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
Frank Domizio explains how security operations can be made more sustainable by working with a managed security service provider (MSSP) to reduce power consumption, as well as the cost of hiring and training cybersecurity talent.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.