Remove Information Security Remove Software Remove Symantec
article thumbnail

Corelight boosts AI-driven network detection and response

Network World

The startup’s CEO is Brian Dye, who previously served as EVP of products for McAfee and SVP of information security for Symantec. According to Corelight, SOC teams face three major problems that status-quo NDR software fails to counter: 1) stealthy and low-and-slow attacks, 2) alert/alarm overload, and 3) tool sprawl.

Network 369
article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Half of that investment has already been earmarked toward accelerating the deployment of VMware solutions to customers, enabling us to increase cloud competition by growing and strengthening VMware’s customer base and bringing value to the on-premises data center while advancing software-enabled workloads.

Vmware 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Sony Hack in Context

CTOvision

Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year.

article thumbnail

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here). The reality is that antivirus software that uses old fashioned methods of signature analysi. To read more please log in.

Symantec 382
article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. At the same time, attackers constantly devise new methods and variants of online threats.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities. Using older software within your own software always carries risk. Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities. Using older software within your own software always carries risk. Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014.