White Hat journey to MXDR
Get to know more about White Hat's journey in the Microsoft partnership evolution.
Get to know more about White Hat’s journey in the Microsoft partnership evolution.
Machine learning is the most widely used of all artificial intelligence solutions, and it’s also the basis for cyber defence.
Why are there more and more cyber attacks on software development environments and how is software company security becoming a key issue in the supply chain?
Recently, an interesting latent malware infection was found on a newly onboarded machine at one of our clients (Client). Microsoft Defender for Endpoint (MDE) reported anomalies about the computer shortly after onboarding, but uncovering the inner workings of the malware and the infection methods required thorough investigation We present the second part of the investigation ...
Recently, an interesting latent malware infection was found on a newly onboarded machine at one of our clients (Client). Microsoft Defender for Endpoint (MDE) reported anomalies about the computer shortly after onboarding, but uncovering the inner workings of the malware and the infection methods required thorough investigation, which anonymized version we present in this article ...
Building cybersecurity is expensive. In a threat environment that is changing daily, newer and newer defence technologies are emerging that would need to be operated in a highly skills-scarce environment. Moreover, new cybersecurity technologies require knowledge that may not be available in the professional domain, such as artificial intelligence. However, compliance requirements such as NIS2 ...
A webinar on how and why outsourcing your security to an MSSP can help transforms your organization and create a 24/7 available and alert attack detection and reaction capacity instantly – to help you protect your data and infrastructure even when you’re on holiday. In case you missed it, let us recap our recent cybersecurity ...
The information security profession is full of three- and four-letter acronyms. Those who just listen to a cybersecurity lecture are likely to lose the plot very quickly. But sometimes even those in the industry are not necessarily able to keep up with the incredibly fast pace of development dictated by the vendors, which means that ...
Since ChatGPT has become available to all Internet users, major vendors have been announcing a series of AI-enabled products and services, including in the field of cybersecurity. We are undoubtedly entering a period of widespread use of AI, which will soon have a noticeable impact on the security of cyberspace. Opportunity or threat, many are ...