article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. The Symantec Government Symposium features 10 sessions where attendees will: Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle.

Symantec 261
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO Business Intelligence

Generative AI has taken the world seemingly by storm, impacting everything from software development, to marketing, to conversations with my kids at the dinner table. Abuse by Attackers: There have also been concerns raised that attackers will leverage Generative AI tools such as ChatGPT to develop novel new attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. ABOUT PALO ALTO NETWORKS. ABOUT SYMANTEC. Santa Clara, CA , Feb 13, 2015 at 5:00:00 AM.

Symantec 150
article thumbnail

AFCEA Defensive Cyber Operations Symposium 5-7 May 2015 at Baltimore Convention Center

CTOvision

There''s also plenty of networking opportunity. Sponsors include a broad range of companies, such as IBM, Cisco, Intel, Leidos, BAE, Solarwinds, Symantec, NES, Informatica, and Teradata. Defense Information Systems Agency’s new operational role in the cyber domain as network defender creates a formal relationship between DISA, U.S.

Symantec 150
article thumbnail

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more

CTOvision

” LinkedIn is one of the top professional networking sites in the world. Is wireless the Trojan horse in your network security? ” Protecting wireless networks is something that absolutely needs to be prioritized in the near future. .” Via Help Net Security, more here. Via ComputerWorld, more here.

Wireless 194
article thumbnail

Microsoft disrupted Trickbot, a ‘prolific’ ransomware distributor and election security threat

GeekWire

The “malware-as-a-service” is used to serve nation-states and criminal networks, Microsoft said. based tech giant worked with FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT and Symantec, a division of Broadcom, to help disrupt Trickbot. The Redmond, Wash.-based

Microsoft 131
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Securing the network One major aspect of Cathay’s cloud optimization plan is embracing Aryaka’s unified secure access service edge (SASE) converged networking, security, and observability platform across its global network, Nair says. It will replace the standard MPLS network, he adds.

Cloud 95