#threat-detection

[ follow ]
#ai
fromIT Pro
3 months ago
Artificial intelligence

How AI agents are being deployed in the real world

The use of AI agents in security enhances threat detection and response efficiency, crucial in light of rising cyber threats.
fromTechzine Global
4 months ago
Artificial intelligence

Vectra AI Analyst assists alert-fatigued security teams

Vectra AI introduces a complete agent portfolio, enhancing threat detection capabilities while reducing security alert noise.
#ai-in-cybersecurity
Information security
fromThe Hacker News
2 weeks ago

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Organizations detect only one in seven attacks due to SIEM log collection failures and ineffective detection rules, leaving networks highly vulnerable.
Information security
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP protects sensitive data and controls its movement; EDR detects, investigates, and responds to endpoint threats, reflecting distinct objectives and operational impacts.
Information security
fromTechzine Global
3 weeks ago

Okta publishes open-source detection rules for Auth0

A GitHub-hosted Customer Detection Catalog delivers ready-to-use Sigma detection rules for Auth0, enabling faster, broader threat detection and community contributions.
#cybersecurity
Tech industry
fromHackernoon
10 months ago

Today's Threats Move Fast-Your SIEM Needs to Move Faster | HackerNoon

Security teams need AI-driven monitoring for real-time threat detection and deep forensics.
Privacy technologies
fromTechzine Global
1 month ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
Privacy technologies
fromTechzine Global
1 month ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Privacy professionals
fromForbes
2 months ago

Google Play Store Warning-Find And Delete All Apps On This List

Users should delete over 350 malicious apps identified by Human Security's Satori team that generate unwanted ad requests.
fromTechzine Global
2 months ago

Thales introduces API security against BOLA attacks

API security is no longer optional - it's fundamental to maintaining business continuity and trust. Without robust measures, organizations risk significant data and trust losses.
Information security
fromInfoQ
2 months ago

AWS Introduces Extended Threat Detection for EKS via GuardDuty

AWS's expansion of GuardDuty's capabilities now includes runtime monitoring for EKS clusters, enhancing threat detection for container-level threats through managed eBPF technology.
DevOps
fromSecuritymagazine
2 months ago

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

The real danger in this case isn't the ransom note - it's how Fog turns a simple screen-recorder into a hidden camera. Software is an essential driver of growth and innovation for every company; however, business apps we install on autopilot can suddenly become spy tools, which means trust is the weak spot. Security teams should keep a live map of where every monitoring app is allowed to run and flag it the moment one pops up somewhere odd.
Information security
fromTechzine Global
4 months ago

Permiso links risk management to threat detection with new platform

Permiso's platform uniquely addresses identity threats by combining risk management with comprehensive monitoring of both human and non-human identities across environments.
Privacy professionals
Privacy professionals
fromThe Hacker News
4 months ago

Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense

Understanding that most SaaS breaches stem from identity misconfigurations is critical to improving security.
Adopting a comprehensive approach to visibility in SaaS applications can significantly reduce attack vectors.
[ Load more ]