Zephyrnet Logo

Tag: threat detection

Four Network Security Challenges for Organizations with a Remote Workforce

Recently, the need for being able to work remotely has dominated the news, making it clear that the ability to connect from...

So, Chronicle, Are You a SIEM?

With this post, I am about to answer the question everybody wants to know the answer for …… is Chronicle a SIEM?However, if you...

Google introduces the Chronicle to detect Enterprise level Cyber Threats

Google has introduced the Chronicle to detect enterprise-level cyber threats to businesses that are vying for quick digital detection & response....

How to Provide Remote Incident Response During the Coronavirus Times

While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes...

Getting Network Visibility into East-West Traffic

Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations as they work to protect their networks from threats....

Botnet operators target multiple zero-day flaws in LILIN DVRs

Experts observed multiple botnets exploiting zero-day vulnerabilities in DVRs for surveillance systems manufactured by Taiwan-based LILIN. Botnet operators are exploiting several zero-day...

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings....

Cyber Resilience Benchmarks 2020

Here are four things that separate the leaders from the laggards when fighting cyber threats.These days, companies that want to compete must go...

Stopping Fraud and Threats with XTN

By Guido Ronchetti, CTO of XTN Cognitive SecurityXTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions...

Process Injection Tops Attacker Techniques for 2019

Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.The threat landscape of 2019...

Enterprise News – ESW #176

Fortinet Introduces Self-Learning AI Appliance for Sub-Second Threat Detection Enterprise IT World, GreatHorn Offers Free Email Protection for 60 Days, ZeroNorth raises...

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source...

Latest Intelligence

spot_img
spot_img