AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.
Coming out of its global analyst event in New Jersey, it's clear that Nokia needs to further develop its security strategy to support its drive into enterprise networking.
Red Hat has a substantial portfolio of security features for container environments. These are designed to protect both the application and the underlying infrastructure.
Telcos should consider partnering leading managed security services players to share risk, assets and know-how, and grow their revenues and brand in this market.
AMTSO’s new standard for transparency in advanced malware testing methods is a step forward in cleaning up the fiercely-contested endpoint security market.
AT&T has announced plans to acquire AlienVault. The acquisition looks like a strong reaffirmation of AT&T’s commitment to the enterprise security market.
A joint White Paper published by HardenStance partner, the Cyber Rescue Alliance, and Nokia entitled "Cyber Security In The Boardroom". Download the White Paper
Unless 5G security options are diverse, customizable and transparent, enterprise CSOs won’t sign-off on new 5G use cases on the scale that telcos are hoping for. Download the White Paper
Buyers and vendors of network security products should actively embrace and support NetSecOPEN as its disruptive and transparent approach can enhance the network security ecosystem.
I participated in this March 13th 2018 Light Reading webinar with Nokia discussing new approaches to leveraging analytics and router infrastructure for DDoS protection. Click on this link for the archived webinar.