

In a recent analysis of threat management, FireEye learned that large enterprise companies rely on security personnel to fulfill multiple roles and responsibilities – an expectation that can prove disastrous when it comes to finding and escalating a critical alert.
This special report is based on a worldwide...
Published: Jan 29, 2016


New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Published: Mar 20, 2014


What 10 things must your next cybersecurity solution do?
In this comprehensive guide, you'll discover recommended criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats. Access it now to learn how to effectively evaluate cybersecurity solutions through...
Published: May 03, 2017


We live in a world of constant threat. Every hour of every day in every country around the globe hackers are working feverishly, attacking both large and mid-sized companies across every industry and region, writing malicious code to exploit your website and computer network.
Every computer, laptop, tablet and mobile...
Published: Aug 20, 2013


New business processes — and the adoption of new technologies within the workplace — are putting even more pressure on IT resources. The task of securing business data is now much harder and more complex.
At the same time, traditional protection tools are no longer adequate to defend businesses against...
Published: Apr 03, 2014


Technology today has become synonymous with data. As each new tool enters the enterprise, the shear volume of information IT organizations deal with compounds. Gartner estimates the amount of data analyzed by enterprise information security organizations will double every year through 2016.
Published: May 14, 2013


Today enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network. They can strike in so many different ways that traditional network security is often ineffective in blocking...
Published: Aug 25, 2014


Legacy antivirus does not stop the malware and non-malware attacks companies face every day, so customers are looking for next-generation antivirus (NGAV) products that will. Yet with all these new technologies, many are confused about what they should be looking for.
In this guide by SANS, a trusted (and...
Published: Jan 11, 2019


Microsoft® Windows 8 has just reached its six-month anniversary 1 , and we at ESET® thought now would be a good time to review where things stand with the latest incarnation of Microsoft’s flagship operating system.
Last year, ESET took an in-depth look at Windows 8’s security, examining many of...
Published: Jun 24, 2013


With one report after another suggesting that cybercriminals have overrun corporate defences, it’s easy to believe marketing hype suggesting that endpoint security is dead – and that cybersecurity is all about how quickly you can respond to the inevitable breach.
Yet a new Cylance survey of iTnews readers...
Published: Mar 21, 2019


With the decreasing effectiveness of prevention suites, information security professionals are turning to alternative approaches to detecting the presence of advanced malware.
The approach seems logical on the surface – “detonating” malware to capture communication traits and endpoint forensics seems...
Published: Apr 14, 2014


Every year, the public relations specialists from at least one blue-chip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data.
There’s always an immediate...
Published: Sep 29, 2014


User and group information must be directly integrated into the technology platforms that secure modern organizations. Knowing who is using the applications on your network, and who may have transmitted a threat or is transferring files, strengthens security policies and reduces incident response times.
User-ID, a...
Published: May 03, 2017


Despite the many layers of security most companies implement, there is still one vulnerability that is often left unprotected: the Domain Name System or DNS.
This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you...
Published: Jun 12, 2018