Source
DARKReading
Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.
Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
Tanium’s Chris Hallenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.
Replacing passwords is not as easy as people think, but there is hope.
Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.
Garret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since cloud services often add complexity.
Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.