Remove 2008 Remove Accountability Remove Risk Remove Threat Detection
article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

Instead, they’ve become complacent in their defence practices and may be exposing themselves to increased risks without even realising it. I’ve partnered with e2e-assure, a leading managed threat detection and response firm as I believe in their brand. You know economic downturns incentivise cybercriminals.

CISO 147
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Out of Palo Alto, California, Cloudera started in 2008 by alumni of Google, Yahoo!, Born from Google in 2008, the Google Cloud Platform is a leading cloud infrastructure provider. Through a portfolio of real-time protection and risk management products, Imperva is consistently listed as a top vendor. Facebook, and Oracle.

Firewall 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. Advanced analytics to detect malicious activity via compliance and security contexts. Threat intelligence and defensive analysis from LogRhythm Labs.

Software 108
article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

Catchpoint launched in 2008 as a dedicated monitoring tools provider right as organizations started to dabble with cloud services. Through the Reveal(x) 360 platform, clients can optimize visibility across core, remote, edge, and cloud deployments, detect threats in real-time, and automate investigation workflows. Catchpoint.

Marketing 110
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

At its core, malware exploits existing network, device, or user vulnerabilities , posing as little a risk as annoying advertisements to the much more damaging demand for millions of dollars in ransom. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. Examples of Crimeware Malware Attacks.

Malware 105
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. BVP Investments.

article thumbnail

Weathering Russian Winter: The Current State of Russian APTs

Security Boulevard

However, the Russian invasion of Ukraine has put the risk and incredible rate of advancement in Russian cyberattacks front and center – with much of the internet (and the world) caught in the crossfire. APT29 AKA CozyBear : This APT is associated with Russia’s Foreign Intelligence Service.