Cylance

Blog
Data Breach Briefing: The Run-Down on 5 Cybersecurity Studies
Information sharing is a critical aspect of cybersecurity.  While studies and surveys can’t match...
Read More
Blog
4 Considerations for Evaluating an Intrusion Detection System
 by Kent Wilson The cybersecurity landscape is cluttered with tools, many of which are difficult to...
Read More
Blog
The Risk of Overconfidence in the Cybersecurity Perimeter
A 2017 survey of IT leaders suggests the vast majority of businesses are overconfident in their perimeter...
Read More
Blog
Bricata in Plain English: SANS Network Security Interview with Chuck Harold
There’s a lot of jargon in the technology community, especially at conferences. Many moderators have...
Read More
Blog
What is the difference between A.I. and machine learning in cybersecurity?
While most people believe that artificial intelligence is real, many still say humans pose a greater...
Read More
Blog
3 Use Cases in Network Security for Threat Hunting
The cybersecurity industry can credit a shift in thinking with bringing down the dwell time of threats,...
Read More
Blog
Bricata Heading to RSA 2017 with Momentum!
Bricata is headed to the 2017 RSA Conference in San Francisco, February 13-17 with momentum stemming...
Read More
Blog
Cyberthreat Evolution Shifts Emphasis to Proactive Detection and Prevention
More than 20 million sensitive documents were extracted from the IT infrastructure of the Office of Personnel...
Read More