Wednesday, July 8, 2015

If you are going to #BlackHat2015 come by our...

If you are going to #BlackHat2015 come by our booth #759 & learn why #Cyphort is the clear alternative to FireEye http://t.co/CChJCbrvQ6

If you are going to #BlackHat2015 come by our...

If you are going to #BlackHat2015 come by our booth #759 & learn why #Cyphort is the clear alternative to FireEye http://t.co/CChJCbrvQ6
Cyphort Social Hub

Wednesday, July 1, 2015

OPM Data Breach: What Needs to Happen Now

OPM Data Breach: What Needs to Happen Now

OPM Data Breach: What Needs to Happen Now

Given that OPM handles records for federal employees, including those obtaining security clearances, the damage can potentially go beyond financial crimes.
Cyphort Social Hub

Helping Cyphort Defeat The Enemy Inside The...

Helping Cyphort Defeat The Enemy Inside The Gates | Sapphire Ventures @sapphirevc

Helping Cyphort Defeat The Enemy Inside The...

When it comes to cybersecurity, we live in unprecedented times! The enemy has figured out how to breach the perimeter security – including firewalls, anti-virus, endpoint security, and more – that enterprises have put up over the last decade and is already inside the gates of enterprises. Security breaches have become so passé that some of them don’t even get mentioned in the press, and if they do the shelf-life of news about the breach lasts only a few days. However, for nearly all enterprises these kinds of security breaches are top-of-mind since the costs associated with each breach continue to creep up and up. According to an IBM study, the average consolidated total cost of a data breach is $3.8 million representing a 23 percent...Read More
Cyphort Social Hub

NGFW – WTF is the Intelligence?

NGFW – WTF is the Intelligence?

NGFW – WTF is the Intelligence?

Definition: Intelligence - can be generally described as the ability to perceive and/or retain knowledge or information and apply it to itself or other instances of knowledge Today’s state of cyber security is one of the most interesting, and challenging it has ever been. If you take a step back and review the advancements in the traditional security infrastructure, there has been little innovation in the terms of providing protection layers that are as advanced as the tactics used by today’s threat actors. Let’s take a look at the state of firewalls, and their mos
Cyphort Social Hub