Timeline Infosec

timelineinfosec.com

Timeline Infosec is an IT consulting company that provides Enterprise Project Management (EPM) solutions and Information Security services. We offer innovative technology solutions that enable our clients to achieve their business objectives while deriving the maximum value from their information technology investments.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Platform Security, Software Security, Cloud Security

LEGIT SECURITY ANNOUNCES INTEGRATION WITH CROWDSTRIKE TO BRING APPLICATION SECURITY POSTURE MANAGEMENT TO CUSTOMERS

PR Newswire | August 02, 2023

news image

Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application sec...

Read More

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

news image

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More

Software Security

RED CANARY AND PALO ALTO NETWORKS EXPAND COLLABORATION TO PROVIDE DETECTION AND RESPONSE ACROSS SECURITY LANDSCAPE

Red Canary | July 08, 2022

news image

Red Canary, the Managed Detection and Response (MDR) trailblazer, has expanded its collaboration with industry leader Palo Alto Networks to help deliver on a bold vision: unifying threat investigation across a wide range of Palo Alto Networks products. To help achieve this goal Red Canary is now a part of the Palo Alto Networks Cortex® MSSP partner program. Today, Red Canary MDR supports Palo Alto Networks firewalls by integrating with PAN-OS version 9 and higher. This integra...

Read More

Data Security

NETSCOUT ANNOUNCES AVAILABILITY OF OMNIS CYBER INTELLIGENCE

NETSCOUT | November 08, 2021

news image

NETSCOUT SYSTEMS, INC.a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced the availability of Omnis® Cyber Intelligence (OCI), the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies thre...

Read More
news image

Platform Security, Software Security, Cloud Security

LEGIT SECURITY ANNOUNCES INTEGRATION WITH CROWDSTRIKE TO BRING APPLICATION SECURITY POSTURE MANAGEMENT TO CUSTOMERS

PR Newswire | August 02, 2023

Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application sec...

Read More
news image

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More
news image

Software Security

RED CANARY AND PALO ALTO NETWORKS EXPAND COLLABORATION TO PROVIDE DETECTION AND RESPONSE ACROSS SECURITY LANDSCAPE

Red Canary | July 08, 2022

Red Canary, the Managed Detection and Response (MDR) trailblazer, has expanded its collaboration with industry leader Palo Alto Networks to help deliver on a bold vision: unifying threat investigation across a wide range of Palo Alto Networks products. To help achieve this goal Red Canary is now a part of the Palo Alto Networks Cortex® MSSP partner program. Today, Red Canary MDR supports Palo Alto Networks firewalls by integrating with PAN-OS version 9 and higher. This integra...

Read More
news image

Data Security

NETSCOUT ANNOUNCES AVAILABILITY OF OMNIS CYBER INTELLIGENCE

NETSCOUT | November 08, 2021

NETSCOUT SYSTEMS, INC.a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced the availability of Omnis® Cyber Intelligence (OCI), the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies thre...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Cloud Security

Securing Remote Access

Whitepaper

resource image

Enterprise Security, Software Security, Cloud Security

Guide to Cloud Security Posture Management Tools

Whitepaper

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

Cloud Security

Securing Remote Access

Whitepaper

resource image

Enterprise Security, Software Security, Cloud Security

Guide to Cloud Security Posture Management Tools

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us