Protecting against today’s rapidly evolving threat landscape requires broad and deep visibility across the entire IT environment. Threats and risks arrive from many angles and evidence of their existence can be found within existing log and machine data. Deeper, essential visibility is gained through targeted host and network forensic monitoring. When this is applied to multiple, machine-automated analysis techniques, threats and risks are exposed like never before.
- Verizon to allow opt-out from mobile 'supercookies'
- Brief: Tesla boosts 0-60 acceleration with over-the-air software upgrade
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Apple puts the big hurt on Samsung
- Google Glass holds promise but requires a 'reset'
- Microsoft updates cloud-based SQL Server to simplify management
- Intuit backpedals from TurboTax changes after upgrade uproar
- Can't keep this bad boy down: ZeroAccess botnet back in business
- Ghost Linux vulnerability can be exploited through WordPress, other PHP apps
- BT to test 500Mbps broadband over copper in two towns
- The Upload: Your tech news briefing for Friday, January 30
- Military-funded robots can learn by watching YouTube