Remove CSO Remove Technology Remove Threat Detection
article thumbnail

New Intel CPU-level threat detection capabilities target ransomware

CSO Magazine

Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Onlineā€™s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ).

article thumbnail

Coca-Cola trade secret theft underscores importance of insider threat early detection

CSO Magazine

She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several companies, including her former employers Coca-Cola and Eastman Chemical Company. The value placed on the development of the stolen technologies is $119.6 Sign up for CSO newsletters. ].

CSO 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dell beefs up security portfolio with new threat detection and recovery tools

CSO Magazine

Dell Technologies has added a slew of in-house as well as partnered capabilities to its security portfolio in a bid to beef up its capabilities in areas including threat security, management, and incident response.

article thumbnail

9 ways hackers will use machine learning to launch attacks

CSO Magazine

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. Here are the nine most common ways attackers leverage these technologies. Defenders have been using machine learning to detect spam for decades, says Fernando Montenegro, analyst at Omdia.

article thumbnail

Consulting firms jump on the Zero Trust bandwagon

CSO Magazine

Within a day of each other, the consulting and outsourcing firms Deloitte and HCL Technologies have both launched new managed cybersecurity services, as consultants look to capitalize on the growing appetite for the Zero Trust security model. To read this article in full, please click here

article thumbnail

SASE is coming, but adoption will be slow (especially for large enterprises)

CSO Magazine

Large enterprises have been better able to adapt to this new reality, having access to larger IT budgets and skilled employees, but small and medium-sized businesses are struggling to keep up with the access control, monitoring and threat detection technologies needed to defend their local and remote assets.

article thumbnail

Intel adds security enhancements to vPro line

CSO Magazine

The platform contains security enhancements including: Threat Detection Technology (TDT), a hardware-based way to detect ransomware in an efficient and timely manner. Anomalous behavior detection to identify living-off-the-land and supply chain attacks. Threat Detection Technology uses machine learning.