In this blog, Cognyte presents the appeal of cryptocurrency to criminals and terrorists, outlines the challenges facing security and law enforcement, and explains how Cognyte’s solution can help overcome these challenges and track down those behind illicit crypto transactions.
Security organizations are still struggling to tap the full potential of the data they have access to, preventing them from making rapid, data-driven decisions.- and as a result are moving to open, modern platforms for security analytics.
2020 was the year ransomware evolved. From data encryption to data exfiltration – ransomware groups are adopting the “double extortion” tactic to increase chances of a payout. Cognyte’s CTI research group analyzed 1,112 ransomware attacks carried out by 21 ransomware groups during 2020 – all of which involved data exfiltration to increase ransomware payouts.
In early February 2021, many of us took note when Tesla bought $1.5 billion in Bitcoin and announced that going forward it would accept cryptocurrency as payment. Cryptocurrencies, such as Bitcoin, Ethereum, Ripple, Bitcoin Cash, Monero, and others, are no passing phase, empty buzzword, or the esoteric interest of tech savvy enthusiasts. To the contrary,…
Cognyte discusses the pains and risks of manual management of security events, and examines how analytics-based command and control systems can maximize security understanding and optimize response actions.
Suffering from ‘data fusion fatigue’ ? overwhelmed by data ingestion and data synchronization challenges? Learn how Cognyte’s security analytics platform fuses data from virtually all data sources, handles data contents of all types, visualizes insights, generates actionable intelligence, and drives smarter security and intelligence decisions.
Cognyte investigates the trends of physical and cybersecurity convergence, how social media promotes this trend, and how this contributes to situational awareness, threat detection and incidence response.
In this blog, we present the findings of Cognyte’s research into the challenges that are preventing security organizations from leveraging their data to gain actionable insights.
Digital transformation – the integration of technology into all areas of life – intrinsically changes how organizations and individuals do things. Everything, from business processes to personal habits, has been impacted by digital transformation. But digital transformation can be a double-edged sword. According to Professor Audrey Kronin, in her book, Power to the People: How…
Learn about the safety challenges the ‘new normal’ is raising, and what proactive steps nation-state, municipal and business institutions should be taking to keep employees, organizations and citizens safe.