Cisco to acquire malware prevention company
Cisco this week announced its intent to acquire ThreatGRID, a New York-based maker of malware analysis and threat intelligence technology.
Cisco this week announced its intent to acquire ThreatGRID, a New York-based maker of malware analysis and threat intelligence technology.
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
Ellen Messmer | 07 May | Read more
Palo Alto Networks, known for its next-generation firewall, Monday said it is buying Israeli start-up Cyvera for about $200 million to gain access to its endpoint security product for real-time attack prevention. The deal is expected to close in a few weeks.
Ellen Messmer | 24 Mar | Read more
Next-generation firewall maker Palo Alto Networks today announced its first acquisition, an intriguing buyout of a stealthy Mountain View start-up called Morta Security whose founders hail from the NSA. The price of the purchase was not disclosed.
Ellen Messmer | 06 Jan | Read more
FireEye's acquisition of Mandiant is getting generally positive reviews from industry analysts, though some caution that FireEye faces a big challenge in its goals related to blending the two security firms' products.
Ellen Messmer | 06 Jan | Read more
US military strategists, CIA analysts, international agency officials and Nobel Prize winning economists concur with the consensus of the world's scientific community: the Climate Crisis is a planetary security issue, as well as a national security issue for each of the one hundred ninety two countries that belong to the United Nations. But the Climate Crisis is also, by extension, a corporate security issue, as well as, yes, a cyber security issue.
Richard Power | 03 Oct | Read more
Not long ago, the legal department at a financial services company in New York got a phone call from a hospital in London. The query: Why are you hacking us? With two known IP addresses, it wasn't difficult for the financial firm's information security staff to go back through the logs looking for traffic between the two organizations. And with the traffic identified, locating the computer from which the hacks were taking place didn't take long, either. The culprit: an individual who-as their human resources records soon confirmed-had formerly worked at that very hospital.
Malcolm Wheatley | 11 Sep | Read more
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.