Displaying items by tag: Threat Hunting

COMPANY NEWS: Taiwan-based threat intelligence company TeamT5, which became active in Australia late last year, is confident that its specialist knowledge will benefit ANZ organisations.

Published in Company news

Automated cybersecurity specialist Forescout Technologies has introduced Forescout Frontline, a threat hunting service for organisations that lack the internal resources and visibility to defend themselves from cybersecurity attacks.

Published in Security

GUEST OPINION: There's no doubt the last couple of years have been interesting ones for ICT channel businesses. The curve ball that was COVID-19 brought unprecedented uncertainty to the market and triggered a tsunami of digital transformation. So, what does the remainder of the year hold in store? Here are five security-related trends your channel business should be across in 2022.

Published in Guest Opinion

GUEST OPINION by Luke Smith, Regional Account Director, Barracuda MSPRansomware is rife but organisations that do the work may be able to avoid paying out, should the worst occur.

Published in Guest Opinion

Expanded Reveal(x) Advisor services help organisations proactively manage cybersecurity hygiene and accelerate incident response

COMPANY NEWS by Extrahop:  ExtraHop, the leader in cloud-native network detection and response (NDR), today announced expanded Reveal(x) Advisor services that provide threat detection and hunting capabilities alongside network assurance analysis. Reveal(x) Advisor provides dedicated ExtraHop threat analysts and security advisors that deliver timely and precise analysis of priority detections, hunt the network for indicators of current or future compromise, and continually probe for vulnerabilities, such as outdated protocol use or shadow IT.

Published in Security

Guest Opinion by Daniel Smith, head of research, Radware. Many of us are currently wrapped up in the SolarWinds and ProxyLogon events. But let's take a moment to highlight the risk that residential routers face from the propagation of IoT botnets and the problems devices present once they are infected.

Published in Guest Opinion

The typical CISO deploys an average of 80 security tools in layers throughout their IT environment — including firewall, intrusion detection, SIEM, antivirus, threat intelligence, vulnerability management, forensics investigation, and many other technologies.

Published in Security

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments