Remove CSO Remove Technology Remove Threat Detection
article thumbnail

New Intel CPU-level threat detection capabilities target ransomware

CSO Magazine

Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Online’s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ).

article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

While these technological investments have their value, theyre not enough to solve the fundamental problem the majority of risks come from humans. The Allure of Technology in Cybersecurity Cybersecurity professionals, like Gregs car-loving coffee enthusiast, often find comfort in technology. Its the complement, not the crutch.

Risk 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coca-Cola trade secret theft underscores importance of insider threat early detection

CSO Magazine

She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several companies, including her former employers Coca-Cola and Eastman Chemical Company. The value placed on the development of the stolen technologies is $119.6 Sign up for CSO newsletters. ].

CSO 124
article thumbnail

MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction

The Last Watchdog

Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025. The 100X effect A similar dynamic was at play at Corelight , a network detection and response provider focused on high-fidelity telemetry. Abdullah Lets start with Dr. Alissa “Dr.

article thumbnail

SASE is coming, but adoption will be slow (especially for large enterprises)

CSO Magazine

Large enterprises have been better able to adapt to this new reality, having access to larger IT budgets and skilled employees, but small and medium-sized businesses are struggling to keep up with the access control, monitoring and threat detection technologies needed to defend their local and remote assets.

article thumbnail

9 ways hackers will use machine learning to launch attacks

CSO Magazine

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. Here are the nine most common ways attackers leverage these technologies. Defenders have been using machine learning to detect spam for decades, says Fernando Montenegro, analyst at Omdia.

article thumbnail

Dell beefs up security portfolio with new threat detection and recovery tools

CSO Magazine

Dell Technologies has added a slew of in-house as well as partnered capabilities to its security portfolio in a bid to beef up its capabilities in areas including threat security, management, and incident response.