Fake data breaches: Countering the damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claim… Continue reading Fake data breaches: Countering the damage

Bridging the gap between cloud vs on-premise security

With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office prem… Continue reading Bridging the gap between cloud vs on-premise security

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the attack surface. Each interconnected device can potentially create new av… Continue reading The power of passive OS fingerprinting for accurate IoT device identification

Infosec products of the month: July 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digi… Continue reading Infosec products of the month: July 2022

New infosec products of the week: July 22, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, CoSoSys, Darktrace, EnGenius, Orca Security, Persona, and Resecurity. Resecurity Digital Identity Protection defends individuals and businesses fr… Continue reading New infosec products of the week: July 22, 2022

Cato Networks opens second PoP in Copenhagen to boost security capabilities across the region

Cato Networks announced the opening of its Copenhagen point of presence (PoP), the twentieth Cato PoP in EMEA and second in the Nordics. The new Copenhagen PoP further extends Cato’s enterprise-grade threat prevention, data protection, and global… Continue reading Cato Networks opens second PoP in Copenhagen to boost security capabilities across the region

Cato Networks detects and interrupts ransomware with network-based ransomware protection

Cato Networks introduced network-based ransomware protection for the Cato SASE Cloud. Using heuristic algorithms and deep network insight, Cato detects and prevents the spread of ransomware across the enterprise without having to deploy endpoint agents… Continue reading Cato Networks detects and interrupts ransomware with network-based ransomware protection

Infosec products of the month: February 2022

Here’s a look at the most interesting products from the last month, featuring releases from: Arista Networks, Blueshift Cybersecurity, Bugcrowd, Cato Networks, Cofense, CoSoSys, Cybellum, Cymulate, Darktrace, DataStax, F5 Networks, Federal Reserv… Continue reading Infosec products of the month: February 2022