The use of threat intelligence to defend networks against attacks is on the rise. Threat intelligence consists of evidence-based and actionable knowledge about attacks. As members of the security aren …
Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully …
Over the last 18 months, there has been much discussion of the “new endpoint”; and, whilst no one wants to be the first to, I suspect 2016 will be the year many start to make some level of endpoin …