DNIF 5 - Serving hot the top 5 cybersecurity news from around the world
India govt IT spending to grow 9.4% in 2021: Gartner
Government IT spending in India is set to total $7.3 billion in 2021, a growth of 9.4 percent from 2020, according to a forecast by Gartner on Tuesday.
Blocked 62.6 bn cyber threats in 2020: Trend Micro
Cybersecurity firm Trend Micro on Wednesday said it detected 119,000 cyber threats per minute in 2020, leading it to block 62.6 billion threats last year.
Cybersecurity pros: Automation and app security are top priorities in 2021
A study on CIO and CISO prioritization showed these two areas are most important this year. Cloud security is another area high on their lists.
SolarWinds Lessons Learned, More Stolen Microsoft Source Code
As the fallout from the SolarWinds hack continues to unfold, Microsoft this week said attackers stole source code for three of its products (but didn’t hack any customers’ information), and an ExtraHop investigation found a 150% increase in suspicious network activity that went largely ignored during the peak of the attack.
Windows Defender Is an Underutilized Endpoint Security Resource
Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business would use to protect its endpoints.
DNIF is an open Analytics Platform that uses Deep-Tech to Auto-magically identify Outliers in user's applications and systems in general. DNIF connects the dots in a High-velocity data lake to uncover scenarios that directly impact business thereby mitigating risks and increasing efficiency. It combines the features of traditional software with advanced technologies such as security analytics, SOAR, UEBA, and security data lake to bring power and efficiency to security operation centers of all sizes. It has one of the fastest response times in the industry and bridges the gap between searching, processing, analyzing, and visualizing data. DNIF offers solutions to the world’s most challenging cybersecurity problems.
Comments
Post a Comment