
Articles
-
1 week ago |
kuppingercole.com | John Tolbert
This KuppingerCole Executive View examines the ThreatLocker Protect, a set of advanced tools in the broader Endpoint Protection Detection and Response (EPDR) market. ThreatLocker focuses on and has dedicated products for Allowlisting, Ringfencing, and Network Control, which will be described below. Endpoint security is and has been a key component of cybersecurity architectures for decades.
-
1 week ago |
kuppingercole.com | John Tolbert
The latest figures from the US FBI IC3 show that scams are on the rise, with an estimated $16.6B in losses in 2024. Cryptocurrency fraud accounts for $9.3B of the total. The most egregious form of crypto fraud is termed “pig butchering”, where fraudsters “fatten” up victims with increasing confidence such that they are willing to put all their assets into the scammers’ accounts.
-
2 weeks ago |
kuppingercole.com | John Tolbert
Constella harnesses a vast data lake of breached credentials and PII, applying machine learning to enhance data accuracy and threat intelligence. Their identity risk posture service detects identity threats using dark web data and sophisticated correlation, focusing on new threats. API and interface access empower real-time threat investigation, crucial for FRIP and ITDR markets.
-
2 months ago |
kuppingercole.com | John Tolbert
XDR offers a comprehensive cybersecurity solution to counter modern threats like ransomware and malware-less attacks by integrating detection and response capabilities across endpoints, networks, and cloud platforms. It enhances visibility and defense through advanced threat detection, automation, and consolidated security operations, addressing key challenges like interoperability, cost management, and endpoint security limitations.
-
2 months ago |
kuppingercole.com | John Tolbert
Cybersecurity insurance, also known as cyber liability insurance, is a specialized type of insurance policy designed to help organizations manage the financial risks associated with cyberattacks and data breaches.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 262
- Tweets
- 140
- DMs Open
- No

RT @kuppingercole: This report provides an overview of the market for #Consumer#Identity and #AccessManagement and provides you with a comp…

My blog on NIST SP 800-207, their new doc on #ZeroTrust. It's not just #zerotrustnetworking, #IAM must also be involved. #ZeroTrustArchitecture needs more standardization, and #cybersecurity practitioners must address possible threats. https://t.co/lMQbacAcoy

Observations on the last round of MITRE ATT&CK test results. #cybersecurity #epp #edr #ndr https://t.co/guJAoQgKAY