Thoma Bravo Announces Offer to Acquire Darktrace plc
Learn more
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
AI Research Centre
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
Half Year Threat Report 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
AI Research Centre
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Darktrace Blog
Thought Leadership
The cyber landscape is always changing. Stay on top of it with the latest insights from Darktrace experts.
Latest Blog Posts
Email Security in 2021: Darktrace's Key Predictions
Darktrace reveals the top five email security predictions for 2021, offering expert insights into protecting your digital communications.
Protecting Industrial Control Systems in the Cloud
The impact of water utility firms in the UK moving SCADA systems to the cloud. Explore ICSaaS and its security implications in practice.
How Email Attackers Are Buying Domain Names to Get Inboxes
Explore how mass domain purchasing allows cyber-criminals to stay ahead of legacy email tools — and how cyber AI stops the threats that slip through.
How Cyber-Criminals Leverage AI in Attacks
Cyber attacks are relentless and ever-evolving. Learn how cyber-criminals are using AI to augment their attacks at every stage of the kill chain.
Securing Operational Technology in Remote Working Conditions
Remote work poses new challenges for cybersecurity professionals. Use these tips to secure your operational technology (OT) in remote working conditions.
5 Security Risks Companies Face Transitioning to Remote Work
Discover 5 security risks companies face with remote work employees. Protect against email scams, weakened security controls, errors, and insider threats.
Digitizing the Dark: Cyber-Attacks Against Power Grids
State-sponsored cyber-attacks continue to target massive energy grids, posing a legitimate threat to modern civilization. Learn more about this threat here.
AI reveals 2018’s biggest cyber-threats: Part one — the rise of nontraditional IT
In the first installment of a two-part series, Darktrace’s Max Heinemeyer reviews the IoT, Cloud, and SaaS trends of last year and forecasts what he expects to see in 2019.
Implications of NIS2 on cybersecurity and AI
Explore the key aspects of the NIS2 Directive, the latest EU cyber security legislation coming into effect in 2024. Learn how it impacts AI and security teams.
Previous