Applications - Article Archives - Page 1

11 Top Security Technologies for 2017

|

Key technologies, according to Gartner, will range from cloud workload protection platforms to managed detection and response solutions.

READ MORE

Trusona Raises $10M to Kill Passwords

|

The startup raises attracts millions of dollars from Microsoft Ventures and Kleiner Perkins.

READ MORE

Almost Half of All Third-Party Software Components Are Outdated, Insecure

|

In almost every case, a more secure version of the software component is available, a recent study found.

READ MORE

IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops

|

IBM Cloud Identity Connect brings secure single sign-on capabilities to businesses looking to manage user access on-premises and in the cloud.

READ MORE

Google Patches Android and Chrome for Security Vulnerabilities

|

Android June update and Chrome 59 provide fixes for security flaws.

READ MORE

OneLogin Password Manager Hacked

|

All customers served by the company's U.S. data center are affected.

READ MORE

WordPress 4.7.5 Fixes Six Security Vulnerabilities

|

Widely deployed open-source content management system patched for a half-dozen different issues as new bug bounty program is set to debut.

READ MORE

Securing Docker, One Patch at a Time

|

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

|

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

|

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Application Firewalls: Protecting Web Applications from Attacks

|

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

Patch Management: How to Update Software on Your Network Securely

|

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Multi-Factor Authentication: A Critical Security Tool for Enterprises

|

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

READ MORE

Securing MySQL DBMS

|

These steps can help you secure your deployment of the open source MySQL Community Server.

READ MORE

Linux Foundation Restructuring CII Security Effort for Scale

|

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



READ MORE

Startup Spotlight: Twistlock's Container Security

|

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

READ MORE

Room for Application Security Improvement

|

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

READ MORE

How to Encrypt a Flash Drive Using VeraCrypt

|

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

READ MORE

Better Security through Benchmarks

|

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

READ MORE

What Are Your Container Security Options?

|

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|