Current endpoint protection solutions are failing causing organisations to pour money into remediation: the average global cost for remediating just…
Advanced anti-virus (AV) capability detects multiple attack vectors to prevent file-based, fileless, and in-memory attacks with the power of artificial intelligence…
Overview The second quarter of 2018 saw a continuation of trends we observed in the first quarter — increasingly diverse…
New ESET research reveals that the hype around the role of AI and ML plays in cybersecurity could be putting…
Next-gen BlackBerry Workspaces with precise recovery capability minimises business disruption BlackBerry has announced its next-generation BlackBerry Workspaces content collaboration platform,…
With rapid digitization and the inter-networked world leading to a huge data explosion combined with the relentless growth of transformative…
Palo Alto Networks Unit 42 researchers have been tracking a group of attackers, which they are calling Gorgon Group. In…
In this interview, we discuss how Data Mining techniques and machine learning algorithms can be extremely useful when applied in covert channel detection and…
Just like the old-fashioned pickpockets and scalpers we’ve learned to avoid, cyber scammers are exploiting major world events to target…
52% of businesses surveyed report loss of customer trust as the top consequence that would result from a breach Two…