Bromium issues warning about 'hidden costs' of detection-based security

clock • 1 min read

SOC teams spend more than £11 million per year triaging threats

Detection-based security tools are insufficient to deal with today's threats, and throw up an unacceptable number of false positives - leading to thousands of wasted man hours. A survey of 500 C...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Accidental exclusion exacerbating cyber's staffing problem

Careers and Skills

Many people who would excel in cybersecurity roles see no obvious way in, with those that do make it getting stuck in entry-level positions

clock 12 May 2023 • 4 min read
Former Head of Police National Cyber Crime Unit joins Cybersecurity Festival

Leadership

Charlie McMurdie spent 32 years in the Met and built the Police Central e-crime Unit

clock 29 March 2023 • 2 min read
Security challenges: Five midsize IT leaders on where they need help

Security

From ransomware and malware to the Internet of Things, midmarket IT leaders are staring down a number of security threats, often with limited resources at hand.

clock 28 March 2023 • 8 min read
Most read
01

Fortinet confirms data breach

16 September 2024 • 2 min read
03

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read
04
05

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Facial recognition brings legal and reputational risks

Ashley Avery, Paolo Sbuttoni and Rachel Griffith
clock 03 September 2024 • 3 min read
SSO is dead: Why the age of zero trust demands secure explicit sign-on

SSO is dead: Why the age of zero trust demands secure explicit sign-on

Single sign-on's cons now outweigh the pros

Al Lakhani
clock 03 September 2024 • 5 min read
Microsoft mandates multi-factor authentication for Azure sign-in

Microsoft mandates multi-factor authentication for Azure sign-in

MFA requirement will be implemented in stages

clock 20 August 2024 • 3 min read