Endpoint-Security Companies in High Demand for Buyouts, Partnerships
Joe Stanganelli | 2/28/2019 | Since last year, endpoint-protection firms have been among the biggest movers and shakers in the cybersecurity realm – with the endpoint-security market seeing more than a typical share of acquisitions and strategic partnerships. Joe Stanganelli takes a look at why this might be happening.
Persistent Attackers Rarely Use Bespoke Malware
Study of the Bronze Union group—also known as APT27 or Emissary Panda—underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools.
Digital Transformation With IoT: Assessing Risk Through Standards & Visibility
Joe Stanganelli | 2/27/2019 | IoT transformation is a gift and a curse that carries both business agility and business risk. As the world digitally transforms into something "smarter" than itself, IoT devices proliferate, demanding a lot of resources to keep up with them all – and, by extension, secure them all.
A 'Cloudy' Future for OSSEC
As more organizations move to the public cloud and to DevOps and DevSecOps processes, the open source alternative for host-based intrusion detection is finding new uses.
Secure the System, Help the User
The enterprise must do its part in deploying and maintaining secure systems so that end users stand a chance against attackers.
Lessons From the War on Malicious Mobile Apps
Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.
Security Analysts Are Only Human
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.
|