Ten Eleven Ventures has joined a growing list of cybersecurity-focused venture capital firms raising new funds to invest in startups solving information security problems. [Read More]
Sequoia is leading a massive $50 million early-stage investment in Chainguard, a startup created by a team of ex-Google software engineers to "make software supply chain secure by default." [Read More]
Cybercriminals operating the Clipminer botnet have made at least $1.7 million in illicit gains to date, according to estimates from Symantec researchers. [Read More]
Devo Technology, a late-stage startup building technology for data logging and security analytics, has closed a new $100 million funding round that pushes its valuation in the $2 billion range. [Read More]
Interpol has announced the arrest of three Nigerians accused of using the Agent Tesla malware to redirect financial transactions and steal data. [Read More]
Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used by carriers in pre-installed Android System apps. [Read More]
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.