The most important news for free via email

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...more

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...more

Artificial Intelligence: The Platform of Choice

Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. ...more

AI-Driven EDR: The Current and Future Path for More Intelligent Detection and Response

The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. No matter how efficient and nimble the professional, the attackers are fast, too. And getting faster every day. As a result, endpoints remain vulnerable. ...more

An Economic Model for Evaluating AI-Driven Endpoint Security ROI

BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine what return on investment enterprises may realize by deploying CylancePROTECT® and CylanceOPTICS™. The resulting study provides readers with a framework to evaluate the potential financial impact and value of deploying AI-driven endpoint protection and detection and response capabilities in their environments. Read this infographic to learn about the key findings. ...more

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protection. Traditional AV solutions, which adopt a ...more

Employees in companies experience IT security as a burden

The more IT security is integrated into the business concept, the more it is perceived as disruptive by employees. A recent TÜV study shows that in almost 60 percent of companies, employees experience IT security regulations as annoying time wasters. This is an indication that IT security and usability still do not always go hand in hand....more on

Cybersecurity remains a male domain

Women often fall by the wayside in the IT security labour market. This is shown by a recent Kaspersky study. In almost half of the companies, women are less strongly represented in IT security than in the other departments. Only 37 percent of companies are actively working to change this situation....more on

Penetration testing - a milestone in corporate security

Penetration tests still have a niche existence in the field of information security. Even the most busy testers rarely carry out more than 20 orders per year, the results of which are almost always secret and protected by strict confidentiality agreements. Accordingly, it is difficult to obtain penetration test evaluations. Rapid7 collected data from 180 penetration tests over a period of nine months from mid-September 2018 to the end of May 2019. The results cover not only internal and external network analysis, but also physical intrusion, pe ...more

Cloud Performance Issues

Is the performance still right? IT departments under high pressure to perform - the CIO study "Top Challenges for CIOs in a Software-driven, Hybrid, Multi-Cloud World". ...more
Actual survey
Which topics are you interested in?
Social Media