CFOtech Asia logo
Technology news for Asia's CFOs and financial decision-makers

Threat hunting stories

Story image
VMware
Latest VMware threat report reveals truth about deepfakes
August 2022
"Cyber criminals have evolved. Their new goal is to use deepfake technology to compromise organisations and gain access to their environment."
Story image
Ransomware
Ivanti and SentinelOne partner on patch management solution
August 2022
Ivanti and SentinelOne will integrate their technologies Ivanti Neurons for Patch Management and SentinelOne's Singularity XDR platform.
Story image
Palo Alto Networks
New study reveals opportunistic behaviour of cyber criminals
July 2022
"Ransomware attackers are also becoming more organised [...] as they engage with cyber criminals and the victimised organisations."
Story image
SaaS
Commvault's SaaS division experiences notable growth
June 2022
Commvault has revealed the global momentum that its SaaS division Metallic has experienced since its launch two years ago.
Story image
Microsoft
Zero trust edge expert joins Microsoft Security Association
June 2022
Through this collaboration, joint customers gain secure, fast access to resources from anywhere, which also allows greater visibility and response to threats.
Story image
DevOps
Orgs increasingly vulnerable to supply chain attacks - study
June 2022
“We can’t solve this problem using existing methodologies. Instead, we need to think differently about the identity and integrity of the code we are building."
Story image
Cybersecurity
Forescout Technologies launches free threat hunting service
May 2022
Forescout Technologies has announced the launch of Forescout Frontline, a new threat hunting service utilising a team of trained cybersecurity analysts.
Story image
SonicWall
Video: 10 Minute IT Jams - SonicWall product management director discusses capture client
February 2022
Today we are talking to SonicWall director of product management Suroop Chandran, for the second IT Jam of our SonicWall series.
Story image
Malware
Research finds malware will sit for around 83 hours in an employees inbox before being noticed
June 2021
Research finds that malicious emails spend an average of 83 hours in employees inboxes before being noticed.
Story image
Cloud
Gartner names ThreatQuotient a representative vendor for SOAR
October 2020
The company is listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions.
Story image
Study
Companies not utilising threat hunters correctly – study
December 2019
“Responding to threats is important for security, but it is not the main task of the threat hunter.”
Story image
Endpoint Protection
Symantec updates endpoint security offering
October 2019
The Symantec Endpoint Security (SES) brings automated assistance with security management to evaluate risks and take action to secure their organisation.
Story image
Endpoint Protection
Sophos launches managed threat response service
October 2019
The resellable service provides organisations with a dedicated 24/7 security team to neutralise threats.
Story image
Cybersecurity
Successful threat hunting requires curation & collaboration
August 2019
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Story image
Cloud Security
Carbon Black announces enhanced cloud security offering
October 2018
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
Story image
Endpoint Protection
Blurred lines: How counterinsurgent strategies apply to threat hunting
August 2018
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Story image
ML
Make the pre-emptive strike against cyberattacks with threat hunting
July 2018
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.