It looks as if Carbon Black's days as part of Broadcom are numbered. Broadcom CEO Hock Tan told staff at newly acquired VMware in both an email and town hall meeting that he plans to "review strategic alternatives." The move comes just four years after VMware purchased Carbon Black for $2.1 billion.
A directory service should be a "source of truth," said Justin Kohler, vice president of products at Spector Ops. But when users are overprivileged or misconfigurations occur, that creates attack hubs. Kohler discusses BloodHound, a solution he says is like Google Maps for Active Directory.
Following the Oct. 7 terrorist attack on Israel, Ami Daniel got a note from the father of a girl in hiding. Daniel messaged the girl, who said, "Just get me out of here." Daniel's reply: "On it." He details his efforts to rescue scores of Israeli citizens from hiding places surrounded by terrorists.
1touch.io tapped longtime Bugcrowd leader Ashish Gupta as its next CEO to help the data intelligence startup address proactive use cases around data-enabled processes. Gupta will continue building out 1touch's workflows and processes around data discovery, classification, privacy and compliance.
AI-generated attacks can be faster and more adaptable than human-led attacks. Organizations can defend against AI-powered attacks by educating their users, creating policies and using AI-powered security tools, said Vlad Brodsky, chief information security officer at OTC Markets Group.
How do you effectively understand and communicate the constantly changing threat landscape?
Join this webinar to learn the key attribution techniques including:
Improving cybersecurity posture through attacker profiling;
Key benefits for network defenders from differentiating threats;
Common threat testing /...
To fully realise the benefits of cyber threat intelligence, we need to effectively communicate the threat landscape.
This webinar will explore the benefits of using operational profiling to build a more precise understanding of adversaries’ attributes. Adopting a richer vocabulary of descriptors offers far more...
AI weaponization, zero days, 'we the people' attacks - these are among the threats projected for 2024 in Fortinet's FortiGuard Labs’ 2024 Threat Predictions. Derek Manky shares insight and analysis on what to expect to defend against in the New Year.
Attack surfaces have become complex and difficult to manage. Security teams need to know where they’re exposed and vulnerable to attack. They also must know what steps to prioritize for securing their attack surfaces.
Check out, Attack Surface Management For Dummies®. This guide offers insights into how ASM...
With rapid digital growth, cloud adoption and scattered public IPs and assets, security teams struggle to accurately identify risks. This creates more opportunities for attackers to take advantage of gaps created by dynamic attack surfaces, and it’s why organizations are adopting attack surface management (ASM) as...
Unknown assets and cloud dynamism create attack surface risks for all organizations.
Understanding these exposures helps security teams shrink their attack surface to proactively secure their organization. The following findings offer insights into these exposures accessible via the internet, gathered from...
Cyberattacks target the very platforms and processes that your software development teams use. And too often this occurs because responsibility for software security falls in the cracks between your product teams and your enterprise security team.
View this webinar, where we will discuss:
Since deception technology provides early warning of potential attacks by tricking hackers into accessing fake information, can AI tools such as ChatGPT be used to create more convincing lures? That's a question Xavier Bellekens, CEO of Lupovis, put to the test - with promising results.
The biggest challenges in threat detection and response today are the inability to cover the entire attack surface and a lack of insight into who is attacking and why. To address these issues, Cisco introduced Breach Protection, a suite of products that combines email, endpoint and XDR protection.
The use of artificial intelligence can profoundly improve operations and services across many industries, but the multifaceted relationship between AI and cybersecurity calls for new measures to address security, privacy and regulatory concerns through the right protocols and procedures.