The SIEM product was reaching hard limits on the amount and fidelity of data it could collect and newer, more complex threats were eluding the rule-based correlation engine. In April 2015, the customer had an investigation that
IT security doesn't have to be complicated. With the right insights at the right time, you can feel confident you're doing everything possible to keep your company, your customers, and your employees safe. By quickly seeing the true
The source code for a trojan that infected hundreds of thousands of internet-of-things devices and used them to launch distributed denial-of-service attacks was published online, paving the way for more such botnets.
Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.
Forensic researcher claims iOS 10 local backups are easier to crack due to a hashing algorithm that is 2,500 times weaker than in iOS 9; Apple confirmed the security flaw and promised to roll out a patch.
In this webinar, 1E Technology Architect Mike Terrill and TrueSec Senior consultant Mikael Nystrom discuss expert tips on migrating to Windows 10 in the most secure way. This can be done using 1E's unique technology to automate the
Bernard Barbier, a former head of the French signals intelligence service, shared a few stories with students of CentraleSupélec, the elite engineering school from which he graduated in 1976, at a symposium this summer.