Archive

Archive

Addressing the Challenges of Moving Security to the Edge

By: John Maddison, Senior Vice President, Products and Solutions For many organizations, the network perimeter has been replaced with a variety of new network edges. Many of these include unique challenges that can severely complicate an organization’s ability to maintain ... »

Overcoming Your Vulnerability Overload with Predictive Prioritization

Tenable introduces Predictive Prioritization, a groundbreaking, data science-based process that re-prioritizes each vulnerability based on the likelihood it will be leveraged in an attack. Are you feeling overloaded by the number of vulnerabilities facing your organization daily? You’re not alone. ... »

SC Magazine Names CrowdStrike Falcon X Best Threat Intelligence Technology at RSA

CrowdStrike’s incredible success at this year’s RSA event included winning the SC Magazine 2019 Trust Award for Best Threat Intelligence Technology for Falcon X™, our automated threat intelligence solution and part of the comprehensive CrowdStrike® Falcon® platform. In giving Falcon X technology this ... »

FireEye M-Trends 2019: Hidden Phishing Risks During Mergers and Acquisitions

Partner, FireEye has released their most recent M-Trends report which looks at some of the significant trends and shifts of 2019, including the Hidden Phishing Risks During Mergers and Acquisitions. FireEye had previously discussed the risks of integrating a compromised ... »

The 5 Biggest Cybersecurity Predictions For 2019

Solution providers will have to contend with a multitude of security-related challenges in 2019 ranging from nation-state and supply chain attacks to increased activity around biometrics and cryptomining. Here’s are 5 cybersecurity predictions for 2019: Increased Social Engineering Will Force ... »