President and CEO Hatem Naguib expects Barracuda Networks to pursue more midmarket growth opportunities in both North America and internationally under private equity firm KKR's tutelage. The company will move from Thoma Bravo to KKR's control for a reported $4 billion in a deal announced in April.
In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.
The company ePlus has purchased Future Com to strengthen its security operations strategy and support of managed services. The deal will allow ePlus to help customers evolve their security operations teams from correlating and analyzing logs to delivering advanced capabilities like threat hunting.
Swimlane has raised $70 million to expand its clientele beyond the Fortune 2000 and acquire more customers in Europe and Asia-Pacific. The company plans to hire more personnel focused on sales, marketing and partnerships to make the company's low-code security automation platform accessible.
Its all-hands-on-deck when a massive vulnerability such as Log4Shell arises, or a vendor announces a newly discovered breach. When headline events happen, security teams must act quickly to determine whether or not their environment has been impacted, then respond appropriately.
Responding to major new cyber events...
Cribl has raised $150 million to drive the development of new features such as hosted versions of the company's technology. The company will build out separate tools for each piece of the observability process rather than forcing customers to purchase a bundle with features they don't care about.
How can teams eliminate analyst grunt work, resolve every security alert every day, and investigate and respond to security incidents faster than ever? - SOAR tool may provide solutions to these problems.
Security orchestration, or SOAR - Security Orchestration, Automation and Response, as it is known to some - is still an area in development, so there are misconceptions about its scope of use and effectiveness for a SOC team. Claudio Benavente discusses the top five security orchestration myths.
Staying ahead of advanced cyberthreats is hard. And detecting unknown or hidden threats is even harder.
Outdated solutions struggle to detect risks posed by insider threats, laterally moving malware and compromised accounts, partly because they’re not built for today’s cyberthreats, but also because the...
Ask a group of security analysts about the challenges of working in cybersecurity, and you’ll likely hear some common themes, like a high volume of security alerts and a shortage of skilled cybersecurity talent. In response to these challenges, security teams have turned to security orchestration, automation and...
As security organizations race to secure their businesses as they move to the cloud and embrace remote work, managed detection and response (MDR) is fast rising as a viable option. But a black-box approach that delivers basic detection and response alone is not enough. What are some key principles organizations need...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.