Posts From Mo Moin

Don’t expect the pace of change to slow down in the cybersecurity industry. Even the so-called traditional protection methods will need to incorporate new technologies and methodologies. Many new cybersecurity programs will span multiple categories, or even resist neat categorizations

Recently, most of the organizations experienced severe downfall due to an undetected malware, Deeplocker, which secretly evaded even the stringent cyber security mechanisms. Deeplocker leverages the AI model to attack the target host by using indicators such as facial recognition,

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, announced that it has been named as the best ‘Anti-DDoS Solutions Vendor of the Year’ at Frost & Sullivan’s 15th annual 2018 Asia Pacific ICT

Illusive Networks, the award winning leader in deception-based cybersecurity, announced the availability of its FirstMove services, the industry’s first comprehensive set of professional and consulting services aimed at helping customers plan, deploy, and optimize a deception-based approach to cybersecurity. A

Acalvio™ Technologies, the global cloud deception leader, announced availability of ShadowPlex Cloud, a fundamentally new platform designed to protect cloud assets. Built on Acalvio’s patented Autonomous Deception technology, ShadowPlex Cloud detects malicious activity within public cloud environments with precision and

Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance,

Every day, security researchers and hackers discover new vulnerabilities, augmenting the tens of thousands of known holes in applications, services, operating systems, and firmware. A vulnerability scanner provides automated assistance for tracking known vulnerabilities and detecting your exposure to them.

Organizations ready to take the next step in threat detection tools and methods should explore the emerging practice of threat hunting as a way to improve their security and monitoring operations. IT security teams are constantly on the lookout for

Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered from all corners of the security stack – from the firewall, endpoints, and servers, from intrusion detection systems and other security solutions. What’s more is

The new threat hunting capabilities introduced by Cato are the latest security in its secure SD-WAN service. The Cato Cloud global SD-WAN service already provides security functions, such as next-generation firewall (NGFW), secure web gateways (SWG), and intrusion prevention systems

The global DNS firewall market is expected to grow from USD 90.5 million in 2018 to USD 169.7 million by 2023, at a Compound Annual Growth Rate (CAGR) of 13.4% during the forecast period. The extreme vulnerability of DNS to

TrapX Security®, the global leader in deception-based advanced cybersecurity defense announced today it has joined forces with Cylance®, in order to improve cybersecurity and stop advanced threats. TrapX DeceptionGrid™ and CylancePROTECT® integrated solution provides accurate, real-time threat detection, visibility, and

According to Gartner, “Future security operations, incident response and threat intelligence teams will use more automation and more consistent processes, and will have to deal with an ever-increasing number of security tools.” “This will necessitate more orchestration capabilities and clearly

Now is the time to deceive the deceivers. As the number of cyber-attacks grows every year and cybercriminals become smarter with their tactics, you can never be too safe with your company’s private information. Now is the time to think

The market for security operations, automation and orchestration products is rapidly maturing. The most recent proof point of this maturation was Splunk’s acquisition of Phantom in February, but other vendors, such as FireEye (acquired Invotas), IBM (acquired Resilient), Microsoft (acquired

Thycotic, a provider of privileged access management (PAM) solutions for more than 7,500 organizations worldwide, announced that Cyber Management Alliance (CM-Alliance) has chosen Thycotic as the PAM solutions leader in a new report titled, “The CM-Alliance Leaderboard: Privileged Access Management