In the News

Lancope In The News

We invite you to read what independent sources are saying about our company and products.

2013  |  2012  |  2011  |  2010  |  2009  |  2008  |  2007  |  2006  |  2005  |  2004  |  2003  | 
November 04, 2013 | News Factor

CryptoLocker Ransomware Spreading Rapidly

November 01, 2013 | Cyber Defense Magazine

Securing the Cloud from Holes, Hackers & Malware

October 31, 2013 | Network World

Gartner: ‘Five Styles of Advanced Threat Defense’ can protect enterprise from targeted attacks

October 25, 2013 | Financial Times

Cyber crime threatens global financial system

October 24, 2013 | Computer World UK

Businesses face €100m data protection fine after EU vote

October 22, 2013 | Enterprise Networking Planning

Lancope’s StealthWatch 6.4 Battles More than Just Stealth IT

October 16, 2013 | Infosecurity Magazine

Insider-led Data Breaches Drive a Need for Holistic Defense Frameworks

October 16, 2013 | IT Security Guru

Insider Threats Are The Cause Of A Third Of Breaches

October 16, 2013 | U.S. Coast Guard Forum

Cyber Watch

October 15, 2013 | Net Security

Solving The Dilemma of Vulnerability Exploitation Disclosure

October 15, 2013 | IT ProPortal

Security Experts: “No Surprise” That Insiders Are No.1 Cause Of Breaches

October 10, 2013 | Security Week

US Government Shutdown Creates Serious Cyber Risks: Experts

October 07, 2013 | Network World

Network Forensics: A Burgeoning Big Data Security Analytics Category

October 04, 2013 | Help Net Security

Reactions from the Security Community to the Adobe Breach

October 04, 2013 | CSO

Despite Risk of Aiding Hackers, Experts Favor Disclosing Vulnerabilities

October 03, 2013 | Network Computing

10 Ways Software-Defined Networking Will Change IT

October 02, 2013 | Threat Post

Researchers Ponder When to Notify Users of Public Vulnerability Exploit

September 30, 2013 | Government Security News

Network Surveillance for Combating Advanced Threats

September 03, 2013 | SC Magazine

At the Ready: Incident Response

August 22, 2013 | CSO

Poison Ivy RAT gnawing on systems again

August 21, 2013 | Security Management

Morning Security Brief: The Guardian and NSA Files, Border Security, IT Problems, and More.

August 20, 2013 | Infosecurity Magazine

It Won’t Happen Here”: Most Organizations in Denial Over Cyberthreats

August 19, 2013 | CSO

U.S. Dept. of Energy Reports Second Security Breach

August 19, 2013 | NewsFactor

Data Stolen Again at Department of Energy

August 15, 2013 | SC Magazine

Detection Times of Breaches Vary Across Businesses

August 13, 2013 | NewsFactor

Chinese NYT Hackers Back with New Malware

August 12, 2013 | Wall Street Journal

Survey Roundup: Cyberattack Uncertainty, Environmental Risks

August 12, 2013 | NBC 11 Alive News

Lancope CEO Mike Potts Talks About Providing Network Security for Some of the World’s Top Companies.

August 07, 2013 | eWeek

Network Security Remains a Blind Spot for Businesses

August 01, 2013 | USA Today

Security Pros React to NSA Chief’s Justification of PRISM

July 26, 2013 | NewsFactor

What the $500 Billion Cybercrime Estimate Means for Enterprises

July 25, 2013 | The Data Chain

Tom Cross, Director of Research at Lancope, gives his session recommendations for‪ #‎BlackHat‬ 2013

July 24, 2013 | Telecom Reseller

Lancope Featured in Telecom Reseller Podcast

July 18, 2013 | SC Magazine

Thriving in New Times

July 17, 2013 | Network World

StealthWatch Featured in Network World’s Products of the Week

July 16, 2013 | SC Magazine

Snowden NSA leaks should prompt fresh look at insider threat

July 10, 2013 | Computer Business Review

Cisco and Lancope Collaborate on Cyber Security

July 08, 2013 | CBS News Atlanta

You don’t have to lose a credit card to become a victim of fraud

July 01, 2013 | SC Magazine

SC Magazine Company news: Recent acquisitions, Secunia’s new CEO, and more

June 25, 2013 | Tech Boson

Deterrence is all about creating fear

June 20, 2013 | Network World

CISOs Need More Control as CIOs Lose Control of IT

June 17, 2013 | BankInfo Security

The Case for Breach Response

June 13, 2013 | ZD Net

Cisco Beefs Up Security Partner Ecosystem For Managing BYOD

June 12, 2013 | Network World

Cisco Looks To Standardize Context-Aware Security

June 03, 2013 | Atlanta Business Chronicle

Lancope Names Ulam General Counsel

June 03, 2013 | IT Business Edge

Protecting the Critical Infrastructure Has Become More Critical

May 28, 2013 | NewsFactor

Iranian Hackers Reported Targeting U.S. Energy Systems

May 22, 2013 | Forbes

Five Critical Uses Of Netflow Data For Security

May 22, 2013 | GRC-Daily

Lancope Enhances Forensics and Incident Response

May 14, 2013 | Dark Reading

3 Big Mistakes In Incident Response

May 13, 2013 | NewsFactor

Sophisticated Bank Hack Leads to $45 Million ATM Theft

May 10, 2013 | Fox News

World grapples with rise in cyber crime

May 01, 2013 | TechWeek Europe

Password Reuse Risk After LivingSocial Breach

May 01, 2013 | Credit Union Times

The May 7th DDoS Attacks: Reactions, Recommendations

April 29, 2013 | Sci-Tech Today

What Enterprises Can Learn from the LivingSocial Hack

April 29, 2013 | eCommerce Times

Millions of Livingsocial Users Now Prime Phishing Targets

April 24, 2013 | Forrester

Observations on the 2013 Verizon Data Breach Investigations Report

April 24, 2013 | Financial Times

Minimising risk: Fake software highlights dangers to supply chain

According to Amrit Williams, chief technology officer of California-based Lancope, a network security company, Russian criminals have hired scientists to create pirate copies of Microsoft’s Windows. “They seem innocuous because they are shrink-wrapped and [hologram protected]. But once loaded in corporate environments, they can easily bypass security controls.”
April 04, 2013 | Dark Reading

Carna Compromise Delivers Data, But Casts Suspicions

April 03, 2013 | Network World

What is the Winning Formula for Big Data Security Analytics Solutions?

April 02, 2013 | Dark Reading

Spamhaus DDoS Spotlights DNS Server Security Challenge

April 01, 2013 | North Fulton

City honors businesses in Alpharetta

April 01, 2013 | IT Business Edge

Anti-Spam Organization Hit with Largest DDoS Attack Yet

March 29, 2013 | CIO Today

Scuba Divers Caught Cutting Internet Cables.

March 21, 2013 | The Journal

Council Rock District Boosts Network Visibility with Team of Monitoring Tools

March 21, 2013 | CIO Today

Widespread Cyberattack Hits South Korean Sites

March 21, 2013 | IT Business Edge

Was It Cyberwar Against South Korea?

March 14, 2013 | Dark Reading

You’ve Been Hacked, But For How Long?

March 04, 2013 | Search Networking

Four IT shops, four approaches to BYOD network security

February 26, 2013 | Network World

Products of the week 2.25.13

February 21, 2013 | The Washington Times

Average computer users need to be on their guard for hackers, too

February 15, 2013 | Bloomberg Business Week

Antivirus Software: Fighting Blame, Not Hacks

February 14, 2013 | NewsFactor

Experts Cite Need for Obama’s Cybersecurity Action

February 14, 2013 | CRN

President Authorizes Cybersecurity Plan For Critical Infrastructure

February 07, 2013 | CSO Magazine

‘Sleeper’ malware like Nap Trojan nothing new

Some malware designers hope to catch their victims unaware, or "sleeping." The makers of the Trojan Nap hope to snare them by having their creation go to sleep itself.

Additional coverage:
Network World
Security News Portal
January 28, 2013 | CIO Today

Homeland Security Warns Cyber 9/11 Could Shut Down US

January 16, 2013 | Security Week

Malware Infects Point of Sale Systems at More Than 100 Zaxby’s Locations

January 16, 2013 | CRN

Georgia-Based Restaurant Chain Data Breach Impacts 100 Locations

January 16, 2013 | Atlanta Journal-Constitution

Zaxby’s investigates credit, debit card breach

January 15, 2013 | Dark Reading

Single Sign-On Mythbusting