SentinelOne CEO Tomer Weingarten hit back at endpoint security rivals CrowdStrike and Microsoft and rumored M&A suitor Wiz for publicly fanning acquisition flames. The endpoint security firm called Wiz acquisition rumors "a head-scratcher," "far from fact" and "pure speculation on their part."
Malwarebytes laid off at least 100 workers this week and plans to split its consumer and corporate-facing business units into separate companies. The antivirus firm cut also recently axed its chief product officer, chief information officer and chief technology officer.
CrowdStrike CEO George Kurtz said point product companies "are quickly going the way of legacy antivirus" as rivals SentinelOne and BlackBerry reportedly hunt for buyers. The endpoint security market is quickly consolidating from being "littered with dozens of companies" to having several vendors.
To develop robust OT cyber security roadmaps and foundations, organizations with OT systems (everything from manufacturing process controls to building control systems to security access systems) should embrace the concept of OTSM (OT Systems Management), paralleling their ITSM practices, but within the unique...
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Alex Waintraub, DFIR expert evangelist at CYGNVS, discusses how generative AI will play a role in the future of incident response - and in all aspects of cybersecurity - and emphasizes its dangers as well as its benefits.
As managed detection and response services have evolved from SIEMs, organizations have seen security gaps widen. Randy Watkins of Critical Start discusses how proactive prevention is key to overcoming the weaknesses in operationalizing threat intelligence.
Discover a New Approach with this Essential XDR Guide
Today's constantly evolving threat landscape means security teams face new challenges:
Advanced attacks evading traditional SIEMs and EDRs
Limited visibility across your complex tech stack
Lack of staff expertise to manage disjointed tools
Need to protect...
Unnecessary cyber alerts are a threat that can overwhelm defenders, leading to burnout and reduced efficiency within the team. Chris Waynforth, vice president and general manager at Expel, said adopting automation solutions to filter and prioritize alerts allows for more effective incident response.
The concept of Zero Trust has gained steam in the cybersecurity industry, and new federal government mandates are accelerating the adoption of a Zero Trust architecture across private and public sectors. The NIST 800-207 standard helps build a solid Zero Trust foundation for any organization that wants to reduce risk,...
In a world accustomed to multiple, fragmented technologies and point solutions, organizations need a unified approach that supports endpoint security and management across heterogeneous devices and operating systems. They need fast deployment and rapid time to value, in both the cloud and on-premise implementations....
Insider threats continue to rise, increasing 44% over two years, according to the 2022 Ponemon Cost of Insider Threats report. With growing corporate layoffs and challenging financial conditions, there is a clear risk of disgruntled employees exfiltrating IP and financial data. Some of the most challenging threats to...
Organizations are challenged to reduce their endpoint security risk. Damage may come from disruption of business operations and/or extortion. And as many victims will attest, ransomware does not stop at the endpoint but seeks to propagate deeper into organizations, for more valuable data.
The elevated...
Cyberattacks are proliferating rapidly and growing in scope as adversaries move laterally across the network and traverse diverse environments. As the Security Operations Center (SOC) works to deal with the increasing threat, they can find themselves overwhelmed by an unacceptably high level of false positives,...
The threat landscape continues to evolve as malicious actors quickly adapt to the changing environment and are finding new ways to exploit your vulnerabilities. It is now more critical than ever to protect your workforce at the endpoint no matter where you are.
Legacy endpoint security tools have proven to be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.