Cylance
Follow
58 Followers
Follow Cylance on their other social channels!
About Us
Founded:
2012
Company Size:
Company Type:
Private
Location:
Irvine, CA
Website:
Cylance is a cybersecurity products and services company focusing on stopping tomorrow's attacks today. Founded in 2012 by ex-McAfee Global CTO Stuart McClure and ex-McAfee Chief Scientist Ryan Permeh, Cylance was created to solve the malware problem once and for all. Our flagship product, CylancePR ...
Read more
Promoted Content
Smart cybersecurity isn’t about layers, it’s about continuous prevention.
Follow
Endpoint Security Isn’t Dead – It’s Just Getting Smarter
A new survey of iTnews readers shows that Australian IT decision-makers still believe in the power of prevention: 56 percent of those surveyed disagreed with the suggestion that endpoint prevention was dead, while just 22 percent agreed.
Follow
Taylor Lehmann: A Different Approach for CISOs in Healthcare
Taylor Lehmann is the CISO of Wellforce, a healthcare system that includes four community hospital campuses, over 12,000 employees, 2,900 physicians, and 1,010 beds. Taylor spoke with Cylance’s Matt Stephenson about the challenges he faces in securing such a large and dynamic IT environment.
Follow
Cylance Smart Antivirus: Enjoy Our No-Cost License Offer!
Cylance is pleased to announce a no-cost trial period for our award-winning Cylance Smart Antivirus software, and with no credit card required. The offer is available for a limited time, between now and November 9, 2018, to any U.S.-based user.
Follow
Cylance Ranked 171 on the Inc. 5000 Fastest Growing Companies List
Inc. Magazine announced that Cylance ranked number 171 on the 37th annual Inc. 5000, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment—independent small businesses.
Follow
Cybersecurity and the Ungrateful Masses
Cybersecurity often feels like a thankless job. If I track a criminal through the forest by looking at shoe impressions and broken twigs, I’m amazing. But if I track a criminal across the globe through code variations and connection timings in a variety of logs, at best I’d get an indifferent shrug from the public. Why?
Follow
Data Breaches and GDPR: What You Need to Know
The security breach notification process under GDPR is difficult to navigate. Given its burdens and complexity, it is more important than ever for data controllers and processors of EU personal data to introduce technical controls to prevent, detect and monitor computer systems for the loss of or unauthorized access to personal data.
Follow
InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
In this episode of the InSecurity Podcast, host Matt Stephenson is joined by Katie Moussouris to talk about bugs and bug bounties and the impact they can have on security and privacy. Katie is an industry legend perhaps best known for creating Microsoft’s first Bug Bounty program in 2013.
Follow
A White Paper About Security White Papers That Looks Like a Security Article
Let me tell you what I want to learn from a white paper, especially a cybersecurity product white paper: I want to find out whether or not a product or service is right for me. Your white paper can be pleasing to the eye and give the illusion of authority if you want. I don’t care. But it better actually tell me something about the product. Read on to learn what I expect from your cybersecurity white paper…
Follow
Leveraging AI for Virtualized Desktop Infrastructures
Artificial intelligence solves a huge number of problems caused by traditional antivirus products on Virtualized Desktop Infrastructure (VDI) images. These are our recommendations for best practices in order to enhance and secure your VDI environment.
Follow
Consumer-Grade GPS Tracking Devices: When Dual-Use Implies Abuse
Consumer-grade GPS tracking devices are marketed as useful tools – to help families find escaped pets or to let taxi firms keep tabs on their fleets. But when these powerful little devices are abused, how can the average citizen protect themselves from being tracked against their will?

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel