Topic: threat visibility
-
Optimize SIEM Data with Securonix DPM Flex
Securonix's Data Pipeline Manager with DPM Flex Consumption enhances threat visibility and compliance by allowing organizations to analyze and retain more data without extra costs, eliminating the need for separate products. The solution addresses "SIEM cost bloat" by offering a flexible entitlem...
Read More » -
Veeam v13 Supercharges AI-Powered Data Analysis
Veeam Data Platform v13 enhances cyber threat defense with integrated Recon Scanner 3.0 for real-time threat visibility and an AI-driven malware analysis agent for autonomous detection and remediation. The platform introduces immutable backups by default, enforces least-privilege access, and inte...
Read More » -
DigiCert Unveils First RADAR Threat Intelligence Brief
DigiCert's inaugural RADAR Threat Intelligence Brief reveals an unprecedented escalation in DDoS attacks, with two incidents reaching peaks of 2.4 and 3.7 terabits per second, signaling a shift where internet infrastructure becomes both weapon and battleground. The report identifies key trends in...
Read More » -
Industrial Control System Vulnerabilities Reach All-Time High
Industrial cybersecurity faces a severe escalation, with over 500 ICS security advisories published in 2025, a record high, and a dramatic increase in both the volume and average severity of vulnerabilities compared to previous years. The most frequently impacted systems are foundational operatio...
Read More » -
Trellix Helix Hyperautomation Streamlines SOC Operations
Trellix has integrated Hyperautomation into its Helix platform, featuring a no-code, drag-and-drop workflow builder to automate security processes and boost operational efficiency. The rise of AI-powered threats is increasing pressure on security teams, with over one-third of CISOs seeking enhanc...
Read More » -
Microsoft Teams Adds Feature to Report Suspicious Calls
Microsoft Teams is launching a "Report a Call" feature in mid-March to let users directly flag suspicious voice calls, providing organizations with visibility into phishing and scam attempts. The feature will be enabled by default and accessible from call history, with reported metadata sent to t...
Read More »