article thumbnail

H.I.G. Growth Partners Invests in Corelight’s $75M Series D Financing

CyberSecurity Insiders

Built on the de-facto open source network security monitoring platform, Zeek and leveraging the power of Suricata , an independent open source threat detection engine, Corelight provides security teams with the world’s best network evidence to close investigations quickly.

article thumbnail

The people problem: Large businesses shift resources to address risks tied to new and disgruntled employees

SC Magazine

Threats increased between Q3 and Q4 at more than half (54%) of the organizations surveyed, with financial services (61%) and high-tech/business services (57%) reporting the highest rate of increase. Phishing remained the most frequent threat. Organizations maintain or increase investment in security solutions.

Risk 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Computing Trends in 2016

Spinone

Due to this difficulty, many organizations are investing in software that uses intelligent threat detection algorithms to identify unusual or risky behavior by users. billion transactions each month, an average of 2,542 are flagged as a potential security threat. Certain industries have a higher adoption level of cloud services.

article thumbnail

Top 7 SaaS Security Gaps for SMBs

Spinone

Depending on the industry and the use cases required, file storage can include various file types from documents, media, spreadsheets, PDFs, vendor specific files, network shares, etc. E-mail and file storage are basic necessities when it comes to businesses services.

Backups 61