LATEST SECURITY NEWS AND ANALYSIS

CrowdStrike Debuts Cybersecurity Search Engine Technology at Black Hat

Security vendor debuts a new capability that will accelerate time to resolution for incident investigations.

Read More

Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

Accenture Security details a new approach to improve incident management and response.

Read More

Intrusion Detection and Prevention Startup Bricata Raises $8 Million

The company's multi-pronged, AI-enhanced intrusion detection and prevention attracts VC funding.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

Six Top CASB Vendors

Six Top CASB Vendors

|

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.

READ MORE
Cisco Cloudlock: CASB Product Overview and Insight

Cisco Cloudlock: CASB Product Overview and Insight

|

We review Cisco Cloudlock CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Microsoft Cloud App Security: CASB Product Overview and Insight

Microsoft Cloud App Security: CASB Product Overview and Insight

|

We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Skyhigh Networks: CASB Product Overview and Insight

Skyhigh Networks: CASB Product Overview and Insight

|

We review Skyhigh Networks CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Deploying an EFSS Solution: Six Steps for Success

Enterprise File Synchronization and Sharing (EFSS) products are making inroads into the enterprise. In fact, Forrester analyst Ted Schadler recently called the space the "hottest technology category since social networking." However, many EFSS implementations leave a number of critical …

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …

Evolve Your Network as Your Business Digitally Transforms

The total number of ransomware samples grew by 127% in 2015. Find out how hybrid connectivity solutions help you stay ahead of the pace of change by keeping your network up and data secure. Evolve your network as your business digitally transforms. Level 3 offers solutions by helping …

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …
 
SEE ALL WHITEPAPERS
 
Bitglass Cloud Security: CASB Product Overview and Insight

Bitglass Cloud Security: CASB Product Overview and Insight

|

We review Bitglass Cloud Security, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Forcepoint: CASB Product Overview and Insight

Forcepoint: CASB Product Overview and Insight

|

We review Forcepoint CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Netskope Active Platform: CASB Product Overview and Insight

Netskope Active Platform: CASB Product Overview and Insight

|

We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

|

Vehicle registration data for every Swedish citizen was exposed -- including those under witness protection.

READ MORE