New ESET research reveals that the hype around the role of AI and ML plays in cybersecurity could be putting…
Next-gen BlackBerry Workspaces with precise recovery capability minimises business disruption BlackBerry has announced its next-generation BlackBerry Workspaces content collaboration platform,…
With rapid digitization and the inter-networked world leading to a huge data explosion combined with the relentless growth of transformative…
Palo Alto Networks Unit 42 researchers have been tracking a group of attackers, which they are calling Gorgon Group. In…
In this interview, we discuss how Data Mining techniques and machine learning algorithms can be extremely useful when applied in covert channel detection and…
Just like the old-fashioned pickpockets and scalpers we’ve learned to avoid, cyber scammers are exploiting major world events to target…
52% of businesses surveyed report loss of customer trust as the top consequence that would result from a breach Two…
NIST announces the release of Draft NISTIR 8214, Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation…
Former FireEye and McAfee CEO Invests in JASK Series B Through NightDragon Security, Joins Company’s Board to Facilitate Leadership and…
Customers validate that FireEye’s unique threat intelligence and effective detection by FireEye technology and analysts creates a unique differentiator that…