Why Does My Company Need to Defend Against Ransomware? 

Why Does My Company Need to Defend Against Ransomware? 

Why Does My Company Need to Defend Against Ransomware? Modern ransomware first entered the scene as a serious and categorical threat in May 2017. Since then, the new category has been an incredible money-maker for

Read More
Nautic Partners Announces the Formation of Advanced Threat Response Holdings, Inc. and the Acquisition of Security On-Demand

Nautic Partners Announces the Formation of Advanced Threat Response Holdings, Inc. and the Acquisition of Security On-Demand

Nautic Partners Announces the Formation of Advanced Threat Response Holdings, Inc. and the Acquisition of Security On-Demand January 20, 2022 – Providence, Rhode Island Nautic Partners, LLC (“Nautic”) is pleased to announce the formation of Advanced

Read More
The Problem with False Positive Alerts

The Problem with False Positive Alerts

The Problem with False Positive Alerts False positive alerts cost enterprises an average of $1.3M annually. Beyond financial loss, a recent study found that nearly half of all cybersecurity alerts are false positives, and 75%

Read More
What is AQ Technology?

What is AQ Technology?

What is AQ Technology? AQ Technology is found in Security On-Demand's ThreatWatch detection & analytics platform. How does AQ Technology make a difference in our threat detection tool? Well, AQ solves the Data Access problem

Read More
UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

Updated Information to Apache Log4shell Remote Code Execution Vulnerability Event Summary Security On-Demand’s Threat Recon Unit continues to track the development of the log4shell vulnerability present in log4j, a nearly ubiquitous Java logging utility present

Read More
Nobelium Activity Targets Government and Business Entities

Nobelium Activity Targets Government and Business Entities

Nobelium Activity Targets Government and Business Entities Events Summary Researchers at Mandiant are tracking a suspected Russian campaign targeting government and business entities around the globe. Mandiant reports that the activity is plausibly linked to

Read More
PREV NEXT

What is AQ Technology?

What is AQ Technology? AQ Technology is found in Security On-Demand’s ThreatWatch detection & analytics platform. How does AQ Technology make a difference in our

Read More »

Latest News

Sign-up to Receive Threat Flash Alerts & Advisories