Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring #outlook a{ padding:0; }...
Imperva to Acquire Distil Networks, the Leader in Advanced Bot Mitigation
As an established leader in cybersecurity, Imperva provides our customers the most comprehensive, analyst-recognized application security solution on the market. We are a five-time...
New Centrify Report: Stop Putting Up with Bad Karaoke and Start Learning about Zero...
You know when you’re hanging out with friends, maybe doing a little drinking, and somebody suggests that you go to a karaoke bar? “Heck...
Zebrocy’s Multilanguage Malware Salad
Zebrocy is Russian speaking APT that presents a strange set of stripes. To keep things simple, there are three things to know about Zebrocy
Zebrocy...
Web Security Leader Rapidly Expands by Partnering with AWS and Imperva
Companies try to plan and pace their growth. Those plans go out the window when a merger or acquisition happens, as it did to...
Five Tips for Communicating Information Security to the Board
Five Tips for Communicating Information Security to the Board #outlook a{ padding:0;...
Infonomics-based Model Teaches CISOs how to Assess their Data’s Financial Risk, Invest Properly in...
Here’s what I consider the biggest contradiction in cybersecurity: the most-financially-damaging, reputation-destroying security incidents almost always involves the theft of millions of database records....
IT threat evolution Q1 2019. Statistics
These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data.
Quarterly figures
According to Kaspersky Security...
15 Myths and Risk Factors in Vulnerability Management
15 Myths and Risk Factors in Vulnerability Management #outlook a{ padding:0; }...













