Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.
Editorial Staff Blogs
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Best Practices for Dealing with Phishing and Next-Generation Malware
Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...
DNS Forensics: Where Intuition Meets Experience
Learn how a DNS-centric approach to unraveling sophisticated attacks can bring stunning results to your cybersecurity strategy.
Gartner Magic Quadrant for Application Security Testing
For the 4th report in a row, Veracode is recognized as a Leader by Gartner for Application Security Testing. The position is based on completeness of vision and ability to execute...
Exploits Explained: Comprehensive Exploit Prevention
90% of reported data breaches involve an exploit in the attack chain. Read this paper to learn about 23 exploit techniques used by cybercriminals, and compare how the mitigations...