Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How User & Entity Behavior Analytics Reduces the Threat of Insider Data Leakage

Most IT systems are protected by defensive technologies which present a significant hurdle to unauthenticated outsiders. However, the company insiders have authentication credentials that allow them past the defensive technologies and provide them with access to the company’s intellectual property.

WannaCry FAQ: What you need to know today!

Friday May 12th will be the day we remember the start of the mayhem caused by ‘WannaCry’, the most successful ransomware infection in history. Since Friday, Security teams have been running around with their heads on fire trying to get ahead of the infection and to understand the malware’s capabilities. In the process, a lot new sales lead ransomware experts seem to have risen from the depths and have confused the situation further.

WannaCry Ransomware Infects Thousands Especially UK's NHS

The recent WannaCry ransomware attack, that has hit over 100 countries, would have been much larger had it not been for the early actions of both a UK cybersecurity researcher who blogs for Malwaretech and two Proofpoint researchers. In this attack, a powerful Microsoft exploit turned into a very nasty worm. As part of their initial effort, the researchers found and sinkholed a domain name hardcoded in the malware, for $10.69 during the early stages of the attack.

Technology Webinar: ImmuniWeb Application Security Platform

ImmuniWeb® Application Security Testing Platform leverages a machine learning technology for intelligent automation of web vulnerability scanning. Complemented by human intelligence, it detects the most sophisticated web application vulnerabilities and comes with zero false-positives SLA.

Women Talk Success in Security from 3 Perspectives | Panel

Embracing diversity is a key driver for success in today’s business world. As a young woman starting or developing her career in technology, you may find inspiration in hearing from other successful women. This live panel features 3 speakers from our R&D organization who will talk about their own career paths leading into security and will share tips and advice that they've learned along the way.

Cybersecurity Dissonance: Perception vs Reality Panel Discussion

Arctic Wolf recently completed a cybersecurity survey and found that nearly every company has very high confidence in their security defenses. However, the survey also identified that IT/security professionals felt security was complex, and they found it difficult to focus on security because their role covered so many different areas.