Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.
Editorial Staff Blogs
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Combating the Top 4 Sources of Software Vulnerabilities
The growing dependence on applications, combined with companies locking down other areas of infrastructure, makes applications a target for cybercriminals. Check out this eBook for...
Read this whitepaper and learn how IoT data can improve operations by optimizing four parameters: visibility, security, profitability, and productivity.
SC Media eBook on Security Analytics
It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.
SC Media eBook on Encryption
With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it...