Active Cyber Defense Strategy Could Use Private Sector AI-based Bounty Hunters to Protect Critical Infrastructure
Concerned about the ability of rogue actors and malignant nation-states to take down the power grid and disrupt the critical financial, transportation, and telecommunications infrastructure of the nation, top U.S. defense strategists are now proposing a strategy of...
Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat?
A group of skilled Russian hackers with a history of infiltrating high-profile targets claim to have stolen the source code used by three major anti-malware vendors based in the United States. Much about this story has yet to be verified, but if true it could force...
Monster-Sized Breaches Are Disasters for Your Enterprise
Regardless of the industries in which they operate, most organizations handle some type of sensitive data, like PII (personally identifiable information). If this information is not protected correctly, the resulting breaches can harm innocent people and, in many...
Cylance 2019 Cyber Security Threat Report
In 2018, Cylance® observed a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to...







