NEWSLETTERREGISTER
The most important news for free via email

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. All of which bag the question: What's going wrong? The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protec ...more

Economics of Insecurity

The information security field is economically inefficient. This is both good and bad. Bad, because it means billions of dollars are squandered on solutions which offer their buyers sub-optimal returns. Good, because the opportunities exist to operate more efficiently and thereby improve the quality of life for everyone. This paper will examine how we know economic inefficiencies exist and why the industry seems unwilling to address them. By understanding these issues, companies will be better able to select effective IT security solutions t ...more

The Total Economic ImpactTM Of CylancePROTECT® And CylanceOPTICSTM

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. C ...more

An Economic Model for Evaluating AI-Driven Endpoint Security ROI

BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study to examine what return on investment enterprises may realize by deploying CylancePROTECT® and CylanceOPTICSTM. The resulting study provides readers with a framework to evaluate the potential financial impact and value of deploying AI-driven endpoint protection and detection and response capabilities in their environments. The following Infographic provides a summary of the key findings. ...more

AI-Driven EDR - The Current and Future Path for More Intelligent Detection and Response

This e-book covers various topics related to artificial intelligence driven Endpoint Detection and Response (EDR). Contents: The State of Endpoint Insecurity Smarter EDR AI-Driven EDR Drives Better Business Outcomes What's AI Got To Do With It Anyway? Evaluating AI-Driven Security Solutions Choose Prevention and Detection for Superior Protection ...more

Better Security, Fewer Resources - Cylance Bolsters Endpoint Protection Without PC Performance Impact or Incremental Costs

When you consider the number of headlines that appear on a regular basis about major data breaches — despite ongoing increases in security technology spending by organizations — you have to come to the conclusion that something isn’t working. The fact is, the traditional ways of protecting IT assets are no longer effective in today’s increasingly complex threat environment. Many vendors tout the idea that having a collection of disparate technologies will provide better protection because each technology will stop some threats. But these pro ...more

Next-Generation Anti-Malware Testing

How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. In other words, did you test for yourself? Did you test the anti-malware solution in your lab? Anti-malware protection just hasn’t been very exciting — until now. In this E-Book, we explain h ...more

Advanced Threat Prevention Test

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was developed jointly to provide additive testing to the commodity Anti-Virus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against 5 competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec and Trend Micro. The test was performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection ...more

Companies do not protect their cloud data

Many companies distrust cloud providers - but the right precautions to protect the data are still not taken. This is shown by the latest Cloud Security Report from Check Point. 40 percent of the companies surveyed have already been involved in cloud security incidents or at least cannot rule them out. One of the headaches for companies is compliance with regulatory guidelines....more on it-business.de

Danger by (e-)mail

The risk of becoming a victim of a phishing attack via e-mail remains very high: last year, over 40 percent of companies were victims of a mail attack. This was the finding of a recent study by Barracuda. Among other things, the affected companies had to struggle with the impairment of business processes, loss of productivity and costs resulting directly from the attacks....more on it-business.de
Actual survey
Which topics are you interested in?