InQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.
from Dark Reading https://ift.tt/eir1AYx
Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
from Dark Reading https://ift.tt/qHPAGgo
Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection
from Dark Reading https://ift.tt/Cgu8FBi
Tanium’s Chris Hollenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
from Dark Reading https://ift.tt/ap8AqXI
We haven’t validated this vuln ourselves… but the source of the story is impeccable. (Impeccably dressed, at least.)
from Naked Security https://ift.tt/HwaoF6g
Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
from Dark Reading https://ift.tt/Ohsva3t
Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.
from Dark Reading https://ift.tt/Ba87T4I
Replacing passwords is not as easy as people think, but there is hope.
from Dark Reading https://ift.tt/jvprViP
Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.
from Dark Reading https://ift.tt/ZSnjVGg