Intrusion

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Partner Content
Poor network visibility: Don't put your enterprise's security at risk

The number of devices that connect to enterprise networks is exponentially growing, leading to an inter-connected information highway. The size, complexity, and mobility of modern network environments are continuously increasing.

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

Top 10 priorities that will help Indian companies to embrace GDPR

On 25 May 2018, the EU General Data Protection Regulation (GDPR) comes into effect, giving regulators unprecedented power to impose fines, and requiring large-scale privacy changes across organizations if they conduct business in Europe.

Symantec targeted attack analytics helps uncover the most sophisticated cyber attacks

AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero-in on the most pressing threats.

SonicWall launches Capture Cloud platform to expand cybersecurity portfolio

SonicWall also is introducing new and enhanced products in its portfolio of hardware, virtual appliances and endpoint clients.