Security On-Demand Received Top #21 Global Ranking in the 2022 MSP501 List. See the list here

Why Machine Learning Models Usually Fail in Cyber Security

Why Machine Learning Models Usually Fail in Cyber Security

History of Machine Learning The term Machine Learning (ML) has been around since the 1950s and has made a massive resurgence in the last five years. Gartner recently discovered that 42% of survey respondents did

Read More
Threat Advisory: Apple Zero-Day Vulnerabilities (CVE-2022-32894 and CVE-2022-32893)

Threat Advisory: Apple Zero-Day Vulnerabilities (CVE-2022-32894 and CVE-2022-32893)

Event Summary Apple is urging macOS, iPhone and iPad users to install the released update as soon as possible. The update includes fixes for two zero-days vulnerabilities under active attack. The patches are for vulnerabilities

Read More
Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products

Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products

Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products Event Summary Multiple product vulnerabilities were reported by F5, including high, medium, and low severity risk weaknesses, involving multiple conditions that could lead an attacker

Read More
Zero Access Trust-The Vulnerability of Trust

Zero Access Trust-The Vulnerability of Trust

Zero Access Trust – The Vulnerability of Trust The year 2020 came to a close with the devastating SolarWinds Supply chain breach, affecting 18,000 of SolarWind’s customers. These attacks affected critical infrastructure, government entities and

Read More
False Positive vs False Negative Alerts in Cyber Security

False Positive vs False Negative Alerts in Cyber Security

False Positive vs False Negative Alerts in Cyber Security We asked our LinkedIn audience in a recent survey, what MDR capabilities matter most? Over half said that false positive reduction was at the top of

Read More
The Data Problem in Cyber Security

The Data Problem in Cyber Security

The amount of data that your organization produces is massive. In addition, the amount of data is increasing exponentially, which makes traditional threat detection in today's complex IT environment difficult. The primary issue is that

Read More
PREV NEXT

Latest News

Subscribe

Keep up to date on our new services and technologies here.