Being an independent firm under TPG's ownership will allow Forcepoint G2CI to invest in defense-grade cyber tools such as insider threats and content disarm and reconstruction. Separating Forcepoint's government security practice will allow it to focus on secure remote access to classified networks.
Join us as thought leaders in industrial cybersecurity, Robert M. Lee, CEO & Co-founder of Dragos, and Blake Moret, Chairman & CEO of Rockwell Automation, delve into critical topics surrounding the current state of manufacturing cybersecurity, manufacturers' responses to increasing risks, and the journey to enhance...
The private equity arm of former Secretary of Homeland Security Michael Chertoff's advisory firm agreed to purchase MDR vendor Trustwave for $205 million. The deal will allow Singtel to refocus its business in APAC and boost shareholder value by optimizing resource allocation.
The firm founded by retired four-star Army Gen. Keith Alexander and once valued at $1.2 billion has officially turned off the lights. IronNet on Friday ceased business operations and terminated remaining employees after probing alternatives and finding additional sources of cash unavailable.
Organizations have relied on disjointed technologies and tools that focus on individual security layers for too long. To stay ahead of threat actors, it is time to change the way we approach security.
This paradigm shift requires us to embrace the next era of cybersecurity that combines human intelligence with AI...
Executives and board members always want the answer to be “yes,” but CISOs know it’s irresponsible to make such a blanket statement. An adversary could be any potential threat — whether external or internal, intentional or unintentional. So, the question CISOs should be answering is: “Are we...
WatchGuard purchased a Massachusetts company to extend network detection and response capabilities traditionally reserved for high-end enterprises to the midmarket through MSPs. The deal gives WatchGuard clients more visibility into east-west network traffic and activity taking place on the cloud.
In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a...
The Defense Department's updated cyber strategy calls for disrupting malicious actors and boosting the cyber capabilities of U.S. allies to take on Chinese threats to critical infrastructure. Defense officials also plan to conduct defensive operations to protect the department's information network.
To some extent, ransomware has become like COVID-19 - a threat we all need to learn to live alongside. But Aaron Bugal, field CTO of Sophos, says there is still much that security and technology leaders can do to reduce their risk by addressing activity that often precedes a ransomware attack.
According this report, the rate of ransomware attacks has remained steady. Sixty-six per cent of research respondents said their organization was hit by ransomware in the previous year. With adversaries now able to consistently execute attacks at scale, ransomware is arguably the biggest cyber risk facing...
According to the latest Sophos State of Ransomware report, there is a ransomware pandemic infecting businesses across the Asia Pacific region.
Ransomware is like COVID-19 – a threat that all businesses need to learn to live with.
In this e-book, Sophos’ Field CTO for Asia Pacific Aaron Bugal discusses with...
IronNet's board authorized the company to furlough nearly all its workers and substantially curtail business operations as the board evaluates seeking bankruptcy protection. The furlough and cessation of business operations constitute an event of default under the terms of the company's borrowing.
Japanese government investigators say cybercriminals are employing a new technique that tricks users into downloading malicious Word files disguised as harmless PDFs. Japan's Computer Emergency Response Team warned that the "maldocs" attack can bypass traditional malware detection.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.