Source
DARKReading
Company research indicates ransomware gangs may be working in concert to orchestrate multiple attacks, explains Sophos’ John Shier.
InQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.
Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.
Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
Tanium’s Chris Hallenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.
Replacing passwords is not as easy as people think, but there is hope.
Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.