News 

Sophos Acquires Avid Secure to Expand Protection for Public Cloud Environments

Sophos, a global leader in network and endpoint security, announced that it has acquired next-generation cloud infrastructure security company, Avid Secure. Avid Secure offers an artificial intelligence-based cloud security analytics, compliance, and DevSecOps platform to provide effective end-to-end protection in public cloud services such as AWS, Azure, and Google. Founded in 2017 by a team of highly distinguished leaders in IT security, Avid Secure uses artificial intelligence and automation to address the real-world challenges of effective cloud security including lack of workload visibility, and the constant monitoring required to stay…

Read More
News 

Sophos Acquires DarkBytes as Foundation of New MDR Services

Sophos, a global leader in network and endpoint security, announced that it has acquired endpoint security platform company, DarkBytes. DarkBytes offers a unified platform to deliver security operations center services to organizations of all sizes. Founded with the mission to deliver enterprise-grade endpoint security through lightweight sensors, asset inventorying, managed threat hunting, and automation technologies, DarkBytes launched their first products in March 2018 and have since been gaining traction in this competitive space. DarkBytes brings to Sophos a highly talented team with rich domain experience in managed detection and response (MDR)…

Read More
Analysis 

How Facebook Is Solving The Fake Accounts Problem

Are you a Facebook user? If you are, then you can count yourself amongst a global community that includes roughly 2.2 billion other monthly active users. That’s pretty wild to think about especially when considering that is active users per month. However, an even more mind-boggling number is the amount of fake accounts the social media giant deleted in the first quarter of 2018: 583 million. Yep, more than half a billion Facebook accounts, all fake, all deleted. In the just the first quarter of this year. To put that…

Read More
Analysis 

Motortech strengthens threat prevention with Check Point Infinity

Cybercrime continues to plague organizations across the world, causing immense amounts of damage and confusion. In 2018, we witnessed an alarming number of large scale data breaches, and the repercussions were both dangerous and costly. Motortech, a specialist manufacturer of parts and accessories for stationary gas engines, recognized the potential damage an attack could inflict, and strengthened their capabilities with Check Point Infinity. “It is important that cyber threats are controlled, blocked or dismissed before they reach the end-user,” says Marcus Morig, Head of Information Technology, Motortech. “We want our…

Read More
Analysis 

With 100+ New Features – R80.20 Cyber Security Management is Here

As cyber-attacks continue to evolve in scale and sophistication, the amount of internet traffic facing enterprises and data centers rises accordingly. Doubling every three years, this massive increase of encrypted traffic over SSL becomes even more of a challenge for complete security. There’s only one way to manage this – enter R80.20 Cyber Security Management. With new, innovative AI engines – dubbed Cadet, Campaign Hunting, and Huntress – R80.20 boasts triple the threat prevention accuracy, with a higher catch rate and lower false positives. R80.20’s new software acceleration engine can…

Read More
News 

Private Investors launch first Blockchain Incubator in the Heart of Swiss Crypto Valley

Founded by Lakeside Partners and a group of private investors, the new investment company CV VC will invest in all stages of crypto and blockchain development, from incubation to late stage. The CV Labs incubator offers seed money and a three-month incubation program to blockchain startups. It is the first incubator that is fully embedded in the unique Crypto Valley ecosystem, focusing 100% on the decentralized technology. Visionary blockchain entrepreneurs will teach and mentors future entrepreneurs. The pre-registration for the incubation program starting this Winter is open. In only a…

Read More
Events News 

Sophos Partner Roadshow 2018 – New Technologies and New Business Potentials

Cybersecurity threats and attacks are becoming increasingly dynamic and organizations are facing the challenge on how to effectively defend against highly sophisticated attacks. Which technologies do you need to protect your customers against these threats? What are the most effective strategies for gaining new customers and how can you make the most out of upsell und cross-sell opportunities? And which major cybersecurity developments can you expect within the next year? Come and see the future of Cybersecurity at Sophos Partner Roadshow 2018 which will be held on 4th October in Zagreb (Croatia) at the hotel DoubleTree by…

Read More
Analysis 

AI and Cybersecurity: combining data with human expertise

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and AI-based medical diagnostics and prognoses. But can artificial intelligence be used effectively to combat cyberattacks? AI-influenced cybersecurity capabilities have evolved well beyond AI washing (a derogatory term coined to describe a technology billed as AI but which in reality, as InfoWorld put it, is “an attempt to make dumb…

Read More

Five Providers of Conversational AI Software Platforms Named IDC Innovators

International Data Corporation (IDC) today published an IDC Innovators report profiling five technology providers that are considered key emerging vendors in the conversational AI platforms market. The five companies named as IDC Innovators are Personetics, Kore.ai, Artificial Solutions, Inbenta, and CogniCor. Conversational AI platforms are used to build applications that answer questions, provide advice and/or recommendations using natural language processing and other dialog related technologies. The market for intelligent conversational assistance is growing rapidly, fueled by the use and acceptance of consumer tools like Google Assistant, Apple’s Siri, and Amazon’s…

Read More

Cyber-Criminals Are On The Offensive During The World Cup: Wallchart Phishing Campaign Exploits Soccer Fans

Keeping track of the World Cup can get overwhelming Cyber criminals are keenly aware of this pain point, seeking to use the buzz around the World Cup as cover for their sneaky attacks. Check Point researchers have identified a phishing campaign targeting soccer fans, using the email subject line of “World_Cup_2018_Schedule_and_Scoresheet_V1.86_CB-DL-Manager.”  This type of phishing scheme exploits victims by downloading an infected FIFA World Cup schedule and results checker onto their PCs. When opened, the attachment uses a malware variant called ‘DownloaderGuide,’ a known downloader of potentially unwanted programs (PUPs)…

Read More
error: https://exclusivenews.ogledalo.rs- Content is protected !!