Home Tags Intrusion Detection

Tag: Intrusion Detection

Sandia Testing New Intrusion Detection Tool That Mimics Human Brain

Neuromorphic Data Microscope can spot malicious patterns in network traffic 100 times faster than current tool, lab claims.

Threat Attribution: Misunderstood & Abused

Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Here's why. Threat attribution is the process of identifying actors...

HPE Details Global Security Operations Center Maturity Levels in New Report

Hewlett Packard Enterprise's 2017 State of of Security Operations Report reveals that 82 percent of Security Operation Centers are not running at the optimal...

GCHQ feeds first crop of infosec startups to Cyber Accelerator

Tech 'créche' will nurture firms to compete on the world stage The first infosec startups selected for the GCHQ Cyber Accelerator have been unveiled. The accelerator,...

Wick Hill Feature: Delivering Secure Wi-Fi

Tony Evans from Wick Hill (part of the Nuvias Group) highlights the risks of Wi-Fi and provides some advice for delivering a secure hotspotThe...

Thales Releases Advanced Encryption Solutions for Secure Docker Containers, Simplified Deployment...

Vormetric Data Security Platform expansion includes patented, non-disruptive encryption deployment and advanced Docker encryptionDecember 8, 2016 – Thales, a leader in critical information systems,...

Just Half Of Organizations Employ Threat Intelligence

PwC survey finds half of enterprises worldwide swap actionable information with industry peers, and 45% with ISACs. Roughly 50% of IT managers worldwide say they...

Vormetric Live Data Transformation from Thales Wins 2016 Computing Security Excellence...

Vormetric Live Data Transformation solution recognised for innovation, functionality and originalityLONDON, England, November 25, 2016 – Thales, a leader in critical information systems, cybersecurity...

Antivirus tools are a useless box-ticking exercise says Google security chap

Advocates whitelists and other tools that 'genuinely help' security Kiwicon Google senior security engineer Darren Bilby has asked fellow hackers to expend less effort on...

Ixia's ATIP Speeds Up Intrusion Detection Process

New enhancements to Application and Threat Intelligence process technology debut along with a new centralized cloud management interface for security appliances. Network security vendor Ixia...

Multiple RCE flaws found in Memcached web speed tool

Facebook, Twitter, YouTube, Reddit among big ticket sites possibly affected A remote code execution vulnerability in popular website backend performance tool Memcached has been found...

New research shows Cloud and IoT adoption requires organisations to future-proof...

Thales and Ponemon Institute research confirms organisations’ biggest PKI challenge is inability of existing infrastructure to support new applicationsPlantation, FL – 11 October 2016...