Tag: threat detection

Imagine a job that changes every day of your life, where you get to do something new each week – that’s what it’s like working in the cybersecurity industry. For me, this is ideal—smarter adversaries, new challenges, and the constant struggle to predict and prepare for the future of security in information technology makes this feel ...
Read Blog
It’s nearly 2018. And from the discussions I have weekly, it’s clear that business leaders understand far more about the risk of cyber threats today than they did even a few years ago. However, so many business leaders I talk to still want to know if they’re doing everything they can to protect their companies. ...
Read Blog
Quando ocorreu o ataque do WannaCry, tive interesse em iniciar uma investigação  para saber a sua origem e como o ataque foi desenvolvido. O que encontrei foi que a exploração usada remonta os vazamentos de informações de um grupo hacker que aconteceram no ano passado e neste ano. Foram cinco vazamentos realizados por hackers e ...
Read Blog
Cuando tuvo lugar el ataque de WannaCry, me interesé en iniciar una investigación acerca de su origen y de cómo se desarrolló el ataque. Encontré que la explotación usada remonta a las fugas de información de un grupo hacker que sucedieron el año pasado y este año. Los hackers llevaron a cabo cinco fugas; una ...
Read Blog
I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. While we’ve made impressive advancements, ...
Read Blog
On January 23, 2017 President Trump issued an executive order placing a freeze on the hiring of federal civilian employees across the executive branch. The freeze applies to all executive departments and agencies, regardless of the sources of their operational and programmatic funding, with the exception of military personnel. In a time of ever-increasing IT ...
Read Blog
[caption id="attachment_65208" align="alignleft" width="213"] Speed and Agility[/caption] Superheroes are part of the lore of American culture -- the thought of human-being acquiring superhuman power such as flight, invisibility, breathing underwater has always been intriguing to many.  The thought of speed and agility is one of those sets of powers that has caught a lot of ...
Read Blog
This blog post was written by Teresa Chen. If you’re a political junky, there’s no lack of intriguing stories and scandals to accompany this election season’s spicy rhetoric. Now, we’ve got the Democratic National Committee (DNC) admitting that more than 19,000 emails were hacked by bad actors and released by WikiLeaks—on the eve of the ...
Read Blog
This blog was written by Victor Vásquez Cruz. Si comparamos a un país con su empresa y a quienes resguardan la frontera con los endpoints de su red, tendremos una primera aproximación a la importancia de esta capa de seguridad, ya que éstos son los primeros en detectar y enfrentar los ataques o amenazas, además ...
Read Blog