Detection | Prevention | Intelligence

Latest articles

5 Questions to Ask About Machine Learning

Machine learning isn’t pixie dust to be spread on products. We look into the nuts, bolts and challenges involved, and how we approach it. There’s no walking the show floor at RSA Conference or Black Hat these days without vendors bombarding you with messages like “machine learning” and “artificial intelligence”. But few of them will get around to...

Invincea receives perfect score from SC Magazine

Invincea gets 5 stars in SC Media’s 2017 Endpoint Security Group Test We are very pleased to announce that Invincea has received a perfect score in SC Media’s 2017 Endpoint Security Group Test. With a 5 star “recommended” rating, this is further third party validation of the strength of Invincea’s ability to harness the power of deep learning (an...

We’re taking a quantum leap over traditional machine learning

Sophos acquired security machine learning company Invincea this year, and we are integrating its capabilities into our products. But many security vendors – traditional and next generation – employ machine learning in their products already. What makes our approach different and, more importantly, how much better does our machine learning approach perform?...

Invincea Machine Learning

Invincea Machine Learning Invincea leverages machine learning to identify and block suspicious files before they execute. Every program found on the endpoint is automatically analyzed to ensure it is not disguising itself as malware. Third party testing has proven that Invincea’s machine learning model outperforms other approaches to detecting malware....

Passcode: Opinion: How to counter the Kremlin’s hacking playbook

ABC World News: A look inside Russian cyberhacking

Ransomware’s Stronghold on Healthcare

Ransomware continues to wreak havoc on healthcare providers to leverage disruption of the healthcare delivery chain in exchange for bitcoin. In this white paper, you’ll learn: Common and emerging threat vectors Motivations of cyber criminals How to deconstruct and respond to an attack Compliance implications and strategies How to safeguard PHI...

Powershell Exploit Analyzed Line-by-Line

PowerShell is one of the top applications used by malware authors to gain a foothold on a victim’s computer.  One reason why it is so frequently used is because of its vast abilities to make changes to the operating system and system resources.  It takes the native Windows command line to another level in terms of its capabilities.  Once a malicious...

Federal News Radio: Invincea founder’s road to success based on problem-solving

Invincea Receives Independent Validation for HIPAA and HITRUST Compliance

X by Invincea Next-Generation Antivirus protects healthcare organizations from malware and other endpoint attacks while meeting compliance requirements Fairfax, VA – Feb. 28, 2017 – Invincea, the #1 performing next-generation antivirus company, today announced that X by Invincea has been independently validated to meet HIPAA and HITRUST compliance...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!