Remove Big Data Remove Malware Remove Mobile Remove Security
article thumbnail

Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat Alliance

CTOvision

In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. Security Rivals McAfee, Symantec Join Cyber Threat Alliance (thevarguy.com).

Symantec 278
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

The acquisition and this new round of funding support Invincea’s rapid growth across the globe, expansion into the small business sector, and further solidifies its position as the market leader in this game changing cyber-security segment. FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc.,

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security attacks and countermeasures

Cloud Musings

Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. by Sandra K. For example, recent breaches include 3.65

Security 159
article thumbnail

The HawkEye-G Approach: Detect, Engage, Remove at Machine Speed

CTOvision

When malware makes is into the enterprise, through gateways, guards or via tricky deception of your workforce, the code seeks to remain low-key. Analysis Big Data CTO Cyber Security DoD and IC Mobile Computer security Data Warehousing Hawkeye HawkEye G Hexis Hexis Cyber Solutions Malware Security Solution Whiteboard'

Malware 255
article thumbnail

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation. By Bob Gourley.

article thumbnail

How TCS is helping to fight financial crime with AI and Microsoft Cloud

CIO Business Intelligence

Every new portal and mobile app expand the attack surface and give hackers new opportunities to exploit vulnerabilities. Challenges for fraud risk management Fraud is a big and a worthwhile business for today’s online criminals, who troll the internet and insert data-stealing malware into vulnerable sites and mobile apps.

Financial 105
article thumbnail

Tech Titans To Visit At Geoint: Here is my take on the must-see firms on the expo floor

CTOvision

Also take time to learn about how auditing and data providence works. 4) Sitscape Very powerful web based software for visual, on-demand situational awareness, agile business-user-centric big data analytics/correlation, contextual collaboration and real-time information sharing. 7) CSC These guys are big and into many things.

Big Data 325