Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Enterprises Use NQE's Dynamic Inventory To Better Track and Understand Network Devices

When Heraclitus wrote in the 6th Century that the only constant is change, he had no way of knowing just how apt his words would prove for contemporary enterprises. Consider, for instance, the effect that the Great Resignation has had on enterprises. In 2021 alone, almost 4 million workers quit their jobs per month – the highest yearly average record of all time for employee turnover.

Netacea Receives Top Score in Bot Detection Criterion in 2022 Analyst Report

Agentless bot management provider ranked among top players in Analyst Report Manchester, 12th April, 2022 – Netacea, the bot detection and mitigation specialist, today announced it has received the highest score in the Bot Detection criterion in The Forrester Wave™: Bot Management, Q2 2022 report.

The Imperative of Managing Cyber Risk in Business Context

People have long used mission statements, declarations and manifestos to publicly convey the intentions, motives or views of its issuer. While the historical political landscape has long used these actions to challenge and provoke, they are also advertisements to gain attention and to spark action.

How to Foster a Productive SOC Culture

According to the 2021 Devo SOC Performance ReportTM — which is based on the results of a survey of more than 1,000 security practitioners — having an understaffed SOC or constant turnover of security talent can cripple an organization’s security posture. Let’s look at some of the root causes that can lead to these two interconnected problems.

Use Service Design in Operations Management to Enhance Security

As an IT operations manager, you spend a lot of your time mitigating service outages and service level risks. You worked diligently to get the right people, products, processes, and partners in place to meet your goals. You managed to ensure continued uptime. You’ve reduced the number of tickets and the cost per ticket. And for your efforts, you’re rewarded with managing your company’s cybersecurity program. The problem? You’re not a security specialist.

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking security breach by NOBELIUM, a group of Russian hackers, brought the cybersecurity world to a standstill with its well-planned and well-executed hacking. It compromised several organizations through a supply chain attack.

Data is Everywhere and Encryption Must Follow: Why You Need EDRM

It is becoming increasingly difficult to guarantee a safe boundary for your sensitive data. As work-from-anywhere cements, employees are now collaborating freely with each other, with contractors and with partners. But this freedom to collaborate more broadly also means information is being shared among devices, applications and networks that your organization doesn't necessarily have control over.