Darktrace annonce son intention d'acquérir Cado Security.
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
L'entreprise
CARRIÈRES
Leadership
Actualités
Fédéral
Investisseurs
Académie
Légal
SDR Academy
À propos de nous
Contacter
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
Cloud
Latest Blog Posts
Exploring AI Email Security & Human Behavior
Read how Darktrace AI is revolutionizing email security. Understand the human behavior of email attacks and how to mitigate your team's malware risks.
Detecting OT Threats: ICS Attack at International Airport
Learn how Darktrace's OT Threat Detection technology identified a sophisticated ICS attack on an international airport. Read more on Darktrace's blog.
The Rise of Stealthy Malware in Public Organizations
Gain insights into how malware attempts to infiltrate public organizations to steal data and the defenses needed to combat these threats.
Darktrace Detects Malicious ISO Files with AI Darktrace Email
Darktrace AI detects malicious ISO file in email attack. Learn more about how Antigena Email stopped the attack without relying on signatures or blacklists.
Emotet Resurgence: Email & Network Defense Insights
Explore how Darktrace's defense in depth strategy combats Emotet's resurgence in email and network layers, ensuring robust cybersecurity.
Evil Corp's WastedLocker Ransomware Attacks Observation
Darktrace detects Evil Corp intrusions with WastedLocker ransomware. Learn how AI spotted malicious activity, from initial intrusion to data exfiltration.
How Off-the-Shelf Tools Are Used for Ransomware
Discover how off-the-shelf tools empower cyber-criminals. Explore a ransomware incident involving a low-skilled threat actor targeting a retail organization.
Darktrace Uncovers COVID-19 Relief Email Scam
Learn about Darktrace's findings on a COVID-19 relief email spoof and how to protect against similar phishing attacks.
Darktrace Email Finds: Fake ShareFile Notification
Stay safe from phishing by recognizing fake ShareFile alerts and compromised supplier accounts in your email.
Darktrace AI Detects Anomalous Behavior in Empty Office
AI uncovered hackers mining cryptocurrency on a biometric server in a deserted office during COVID-19. Learn how Darktrace detected this attack in real-time.
Ransomware-As-A-Service Threat: Eking Targets Government
Discover how Eking ransomware targeted a government organization in APAC. Learn about ransomware as a service & the cyber AI technology that stopped the threat.
Guarding Against Threats Beyond IT
We explore insights from a vast customer database, exposing the widespread adoption of ICS protocols within IT settings.
How to Prevent Spear Phishing Attacks Post Twitter Hack
Twitter confirmed spear phishing as the cause of last month's attack. Learn about the limits of current defenses against spear phishing and how AI can stop it.
Insider Threats: Microsoft 365 Account Hijack
Darktrace's Cyber AI Platform swiftly detects and alerts on anomalous behavior in Microsoft 365 accounts in real-time.
WeTransfer Impersonation Attacks Caught by Darktrace AI
Darktrace email finds two WeTransfer impersonation attacks caught by AI. Learn how Antigena Email detected and stopped malicious spoofing attempts effectively.
US Distributor Hit by LeChiffre Ransomware
Discover how LeChiffre ransomware targeted a US distributor and the measures taken to mitigate the attack, as reported by Darktrace.
How Darktrace Email Protects Against IT Impersonation
Protect your organization from email impersonation attacks. Learn how Darktrace's AI technology can detect phishing threats in real-time on our blog.
Resurgence of Ursnif Banking Trojan "May's Most Wanted Malware"
The Ursnif banking trojan tries to blend into the network as legitimate Zoom and Webex activity, trying to capture credentials. See how Darktrace stops it!
Industrial Sabotage Threats Uncovered
Protect your industrial systems from cyber threats with Darktrace's OT Threat Finder and learn how to prevent industrial sabotage.
Email Security: Darktrace's Approach to Safe New Contacts
Effective email security should provide full protection and keep business running smoothly. Learn about the security approach that Darktrace Email uses!
Previous
Next