Remove Architecture Remove Big data Remove Cyber Attacks Remove InfoSec
article thumbnail

2020 Hindsight – Top 10 Highlights from McAfee

McAfee

With the new work from home environment, we released a report uncovering a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic, along with an increase in cyber-attacks targeting the cloud. To support today’s U.S.

article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

Therefore, the SDL also includes the function of data enrichment by adding context. For example, if a connection to a corporate system originates from an unfamiliar computer or remote location, InfoSec tools may block this operation. Information security data analysis and reporting. Scalable architecture.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Ricardo Villadiego, founder & CEO of Lumu , expects “a significant shift towards adopting models based on passwordless architectures like Google Passkeys as the dominant authentication method to combat phishing and scam campaigns. Cyber attacks against critical infrastructure are too easy – we’re still vulnerable and unprotected.