Our Blog

Home / Blog

The real reason why malware detection is hard and underestimated

The real reason why malware detection is hard and underestimated

Researchers develop an AI with a 98% malware detection rate and 5% false positive rate. If you think this is a splendid technology for antivirus software, this article might change your mind. Malware detection is undecidable but not impractical Fred Cohen already gave...

The Roadmap to Adopting SASE in 2022 According to Gartner

The Roadmap to Adopting SASE in 2022 According to Gartner

Secure Access Service Edge (SASE), the converged networking and security approach first proposed by Gartner, is rapidly becoming the de facto architecture for connecting and protecting distributed businesses and hybrid workforces. Its combination of SD-WAN networking...

Understanding and Protecting CUI

Understanding and Protecting CUI

The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more efficiently, but it also means less control over shared information and more people looking at data. This trend, along with ad-hoc...

How Daification and Data Loss Prevention Go Hand in Hand

How Daification and Data Loss Prevention Go Hand in Hand

In an age when data discovery and the protection of sensitive data have become key to reaching compliance with laws and international standards such as the EU General Data Protection Regulation (GDPR), HIPAA, and PCI DSS, data classification and Data Loss...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo