Why You Need a Personal VPN | McAfee Blog

Why You Need a Personal VPN | McAfee Blog

It used to be the case that only businesses used virtual private networks (VPNs) to connect securely to the internet and keep their private data safe. But these days, with the rapid growth of online threats and privacy concerns, even casual internet users should seriously consider using a VPN. Nearly 30% of people now use VPNs for personal reasons, and that number is only growing as more people learn about how VPNs offer an effective…

Read More

10 Hot AI Cybersecurity Tools At RSAC 2024

10 Hot AI Cybersecurity Tools At RSAC 2024

Vendors including Palo Alto Networks, Trellix and Proofpoint debuted new AI-powered security tools and capabilities this week during the conference. Without a doubt, this year’s RSA Conference in San Francisco has lived up to expectations when it comes to the focus on generative AI. RSAC 2024 has seen countless vendors unveil new security tools and capabilities leveraging large language model technology, and for the second year in a row, GenAI has been ubiquitous in conversations…

Read More

20 Coolest Cybersecurity Products At RSAC 2024

20 Coolest Cybersecurity Products At RSAC 2024

At RSA Conference 2024 this week, vendors are showcasing new products in categories including SASE, security operations and application security — with many touting newly released, GenAI-powered cybersecurity capabilities. Big RSAC Product Announcements Even as the cybersecurity industry continues to maintain its rapid growth pace — leading many vendors to roll out product announcements throughout the year — major makers of cybersecurity tools also continue to target the launch of new products and capabilities at…

Read More

New Cisco Defense Orchestrator (CDO) API

New Cisco Defense Orchestrator (CDO) API

Cisco Defense Orchestrator (CDO) provides a powerful REST API to automate and simplify security management tasks. You can find CDO API Documentation on DevNet. And tune in to a live discussion on April 24th on YouTube or LinkedIn to learn about how to get started, and integrations of CDO with Ansible and Terraform. Key features include: Manage devices, services, and device managers Deploy changes to devices at scale Manage objects (coming soon) Perform complex searches (coming…

Read More

Rethinking network and security monitoring in the age of TLS 1.3

Rethinking network and security monitoring in the age of TLS 1.3

The adoption of the Transport Layer Security (TLS) 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards. TLS has been widely used to secure data end-to-end for many decades. Though this latest version significantly enhances the security of the TLS protocol, it also severely limits the decryption of those data streams for cybersecurity and network monitoring purposes. This results in our current forms of network and security monitoring used with previous…

Read More

Identify and Investigate Uncommon DNS Traffic

Identify and Investigate Uncommon DNS Traffic

Programmatically filter uncommon DNS Requests with Cisco Umbrella APIs We use the Internet in our everyday lives to get work done, manage our lives, and even socialize. We take this Internet usage for granted these days, but the reality is that we are communicating more than ever on a global scale, instantaneously, and often, with folks we’ve never met in-person or with third-party services we don’t fully understand. From a cybersecurity perspective, this looks like…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Keep Your Network Secure With This $39.99 CompTIA Bundle

Keep Your Network Secure With This $39.99 CompTIA Bundle

TL;DR: Secure systems require experts who are up to date on the latest threats, and the Complete 2024 CompTIA Cyber Security Certification Training Bundle gives IT experts and regular users alike the tools they need to protect their networks for less than $40. As a regular internet user, you’ve probably already been targeted by malware, hackers or some other bad actor on the web. It probably happens multiple times a month. Now imagine how bad…

Read More

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain “can be used for sensitive information gathering purposes and to enable follow-on activity,” enterprise security firm Proofpoint said in a Monday report. At least two campaigns taking advantage of this approach were observed on February 26 and 27,…

Read More
1 2 3 8