LATEST SECURITY NEWS AND ANALYSIS

Capsule8 Goes Cloud-Native and Container-Aware for Threat Prevention and Response

Built for production clouds, Capsule8 Protect provides continual threat detection and blocks attacks on containerized environments.

Read More

Black Hat: Building a Ransomware Resilient FileSystem with ShieldFS

Researchers details new approach that could one day help to limit the risk of ransomware attacks.

Read More

Managing Third Party Risk: Outside Law Firm Exposes Wells Fargo Client Data

The data exposed ranges from high net worth clients' financial details to financial advisors' compensation information and client lists.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

CrowdStrike Debuts  Cybersecurity Search Engine Technology at Black Hat

CrowdStrike Debuts Cybersecurity Search Engine Technology at Black Hat

|

Security vendor debuts a new capability that will accelerate time to resolution for incident investigations.

READ MORE
Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

|

Accenture Security details a new approach to improve incident management and response.

READ MORE
Intrusion Detection and Prevention Startup Bricata Raises $8 Million

Intrusion Detection and Prevention Startup Bricata Raises $8 Million

|

The company's multi-pronged, AI-enhanced intrusion detection and prevention attracts VC funding.

READ MORE
Six Top CASB Vendors

Six Top CASB Vendors

|

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Business Perception of IT Security: In the Face of Inevitable Compromise

To investigate cyber threat landscape perception and reality, Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries. We asked businesses about their perceptions of the main security threats they face and the …

Deploying an EFSS Solution: Six Steps for Success

Enterprise File Synchronization and Sharing (EFSS) products are making inroads into the enterprise. In fact, Forrester analyst Ted Schadler recently called the space the "hottest technology category since social networking." However, many EFSS implementations leave a number of critical …

Application Security and DevOps: What is the true state of security in DevOps?

Research results provide insight into current DevOps security practices at both large and mid-sized enterprises, and highlight multiple gaps that still exist between the opportunity to have security as a natural part of DevOps and the reality of current implementations.

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …
 
SEE ALL WHITEPAPERS
 
Cisco Cloudlock: CASB Product Overview and Insight

Cisco Cloudlock: CASB Product Overview and Insight

|

We review Cisco Cloudlock CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Microsoft Cloud App Security: CASB Product Overview and Insight

Microsoft Cloud App Security: CASB Product Overview and Insight

|

We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Skyhigh Networks: CASB Product Overview and Insight

Skyhigh Networks: CASB Product Overview and Insight

|

We review Skyhigh Networks CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE
Bitglass Cloud Security: CASB Product Overview and Insight

Bitglass Cloud Security: CASB Product Overview and Insight

|

We review Bitglass Cloud Security, including the cloud security product's use cases, notable features, security qualifications and supported applications.

READ MORE