Topic: security automation

  • Stop Hackers Exploiting LOTL Attacks

    Stop Hackers Exploiting LOTL Attacks

    Attackers increasingly use "Living off the Land" (LOTL) techniques, leveraging legitimate system tools like PowerShell to blend malicious activities with normal operations, making detection difficult. Bitdefender's PHASR technology counters LOTL by learning individual user and endpoint behaviors ...

    Read More »
  • Proofpoint's 4 New Innovations to Secure the Future of Work

    Proofpoint's 4 New Innovations to Secure the Future of Work

    The rise of the agentic workspace, where humans and AI agents collaborate, introduces new security challenges that require a fresh, human-centric security approach. Proofpoint has launched innovations to protect AI interactions, including Prime Threat Protection to block malicious prompt injectio...

    Read More »
  • Master Your Data: Start with Visibility and Control

    Master Your Data: Start with Visibility and Control

    Organizations face increasing pressure to secure data as AI expands data volumes and strategic value, driving significant IT investments in cybersecurity and cloud infrastructure amid stricter regulations like Australia's updated Privacy Act. Fragmented data environments create security gaps thro...

    Read More »
  • SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne has been named a Leader in the IDC MarketScape for XDR software in 2025, highlighting its AI-native cybersecurity platform, Singularity, which unifies security data and analytics to combat threats effectively. The platform integrates endpoint, cloud, identity, and generative AI securi...

    Read More »
  • Flowmon ADS 12.5: Effortless Threat Detection Made Simple

    Flowmon ADS 12.5: Effortless Threat Detection Made Simple

    Progress Software has launched Flowmon ADS 12.5, an AI-powered anomaly detection system designed to simplify threat identification and provide enhanced network visibility for organizations. The solution addresses challenges like alert fatigue and resource constraints, especially for midsize busin...

    Read More »
  • Data Engineering for Cybersecurity: A Comprehensive Review

    Data Engineering for Cybersecurity: A Comprehensive Review

    Data engineering is crucial for cybersecurity, converting raw logs into actionable insights, but many organizations struggle with managing and utilizing the vast amounts of security data they collect. The book offers a structured approach, covering fundamentals like SIEM integration and log colle...

    Read More »
  • Google Drive adds AI ransomware protection

    Google Drive adds AI ransomware protection

    Google Drive now uses AI to automatically stop file synchronization when ransomware is detected, protecting cloud-stored documents from encryption and ensuring a restorable copy remains available. The system alerts users via desktop and email notifications, allowing easy file recovery through Goo...

    Read More »