Your browser does not support JavaScript or it may be disabled!
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
Get Realtime News
on your webpage

About 99 results for "dmitri alperovitch"

Hygiene, Honey Pots, Espionage: 3 Approaches To Defying Hackers

Hygiene, Honey Pots, Espionage: 3 Approaches To Defying Hackers

Dmitri Alperovitch, co-founder of the cybersecurity startup CrowdStrike, says his company is building stockpiles of intelligence about potential hacking groups. Keith Bedford Reuters/Landov We're still waiting for details on how the hack against ..., 1 month ago

4 images for dmitri alperovitch

NPR, 1 month ago
WUWM, 1 month ago
Canberra Times, 3 months ago
E-Security Planet, 3 months ago

CrowdStrike leverages VMRay technology to enhance threat intelligence capabilities

VMRay GmbH, provider of the fastest and most comprehensive threat analysis capabilities in the market, announced today that it has entered into a technology partnership with CrowdStrike Inc., a leading provider of next-generation endpoint ...
 PRWeb2 weeks ago
Reuters UK

Politics intrudes on cybersecurity

SAN FRANCISCO (Reuters) - The $71 billion (47.56 billion pounds) cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors ...
 Reuters UK2 weeks ago Politics Intrude as Cyber-Security Firms Hunt Foreign Spies  NDTV3 weeks ago Politics pollute cyber-security ethics  IT Web3 weeks ago Politics intrude as cybersecurity …  Yahoo! India3 weeks ago

How to use big data for cybersecurity

Now that big data has developed past its buzzword stage and its use is more common in the enterprise sector, business leaders are seeing real value from its analysis. Information collected from different departments across the company can reveal a ...
 Trend Micro3 weeks ago

Big Data For Intelligence Symposium

Applications & Analytics For Intelligence, Defense & Homeland Security 30 April, 2015 - 1 May, 2015, Washington, DC, United States Information Sharing and Analytics Meeting the Nation's Intelligence Challenge While tremendous progress has ...
 ASD News1 month ago

Maintaining vendor trust proves tough for Lenovo, Microsoft

While one would like to assume that, when it comes to security, vendors act in the best interest of their customers, this is not always the case. Three news developments this week highlight that while vendor trust can be easily lost, it is not ...
 SearchSecurity.com1 month ago

Code typo helps tie North Korea to the Sony hack

A security firm says code used against Sony has similarities to other malware linked to North Korea A security company in the U.S. has provided further evidence that last year's devastating hacking attack on Sony Pictures Entertainment was carried ...
 Computerworld1 month ago What's in a typo? More evidence tying North Korea to the Sony hack  Computerworld Australia1 month ago Previous exploits link North Korea to the Sony hack  TechCentral.ie1 month ago Why the Sony hack drew an unprecedented US response against North Korea  Stars and Stripes2 months ago
E-Security Planet

CrowdStrike: PlugX is the Most Popular Malware for Nation-state Adversaries

Details on which tools nation-state threat actors use are included in the 2014 CrowdStrike Global Threat Intel report that was released this week. Among its findings: The PlugX Remote Access Tool (RAT) is the most observed malware variant used in ...
 Internet News1 month ago Report: PlugX Is RAT of Choice for Nation States  E-Security Planet1 month ago CrowdStrike demonstrates how attackers wiped the data from the machines at Sony  CSO Magazine1 month ago
CIO Magazine

Report: Chinese Groups Behind Most State-Sponsored Attacks in 2014

Chinese adversaries were the most active state-sponsored cyberthreat groups last year, according to report released today by CrowdStrike, but it was Vietnam, not the U.S., that was its top target. A group CrowdStrike code-named "Goblin Panda" ...
 CIO Magazine1 month ago Chinese groups behind most state-sponsored attacks in 2014  MIS Asia1 month ago

Nation-State Attacks on Government, Commercial Entities Persist

The latest CrowdStrike Global Threat Intel Report details the 2014 threat landscape and identifies the key malware and tools used by nation-state-backed threat actors. The 2014 CrowdStrike Threat Intel Report is now available, shedding light on ...
 EWeek1 month ago
Prev | Next
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts


Realtime News

on your Webpage

Add Widget >Get your members hooked!
Related Queries - dmitri alperovitch
Get updated on latest news & your favorite topics right in your inbox!
More     Less