Find

August 15, 2020

Study reveals 94% organizations experienced a cyberattack in past 12 months

Only four out of ten security leaders say they can answer the fundamental question, “How secure, or at risk, are we?” with a high level of confidence, despite the prevalence of business-impacting cyberattacks.
by | 2 min read
August 5, 2020

Qualys enables security teams stay on top with its Multi-Vector EDR

Multi-Vector EDR enables security teams to unify multiple context vectors like asset and software inventory, end-of-life visibility, vulnerabilities and exploits, misconfigurations, network traffic summary, MITRE ATT&CK tactics and techniques.
by | 2 min read
August 3, 2020

McAfee makes cloud threat mapping easier with MITRE ATT&CK

The ATT&CK integration brings cloud attacks into focus and provides the opportunity to identify gaps in protection and make policy and configuration changes directly from McAfee MVISION Cloud.
by | 2 min read
July 25, 2020

New F5 Solution protects websites from fake internet traffic

Silverline Shape Defense uses artificial intelligence to accurately determine in real-time if an application request is from a human or a bot, and further differentiate between a bad actor and authorized individual.
by | 2 min read
July 23, 2020

McAfee Threat Report shows evolution of cyber threats in Q1 2020

McAfee Labs saw an average of 375 new threats per minute and a surge of cybercriminals exploiting the pandemic through COVID-19 themed malicious apps.
by | 3 min read
July 22, 2020

CyberKnight forms strategic alliance with YL Cyber & Cloud Consulting

To address challenges and needs specific to the threat landscape in sub-Saharan Africa, CyberKnight has strategically aligned with YL Cyber & Cloud Consulting to focus initially on three portfolio vendor.
by | 2 min read
July 17, 2020

BIG SHIFT TO THE CLOUD RECORDED

The COVID-19 pandemic has put the world into survival mode. […]
by | 4 min read
July 15, 2020

94% of security teams start threat investigations with DNS

Accelerate Threat Resolution with DNS study reveal they most often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware.
by | 2 min read
July 7, 2020

Keeping Data Protected as the Middle East Embark on the Remote Working Journey

With many employees working from home, businesses can expect a huge spike of personal file storing coming in from external sources. This is the perfect opportunity for malicious malware to make their way into servers, potentially corrupting a network of data.
by | 3 min read
July 7, 2020

CyberStart Game to teach young adults to fight cyber criminals

This 100% online learning platform is designed to teach complex security concepts promoting self-exploration and investigation over traditional learning methods.
by | 2 min read