Paul Rubens - ALL ARTICLES - PAGE 1

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

April 28, 2017
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Penetration Testing: DIY or Hire a Pen Tester?

April 25, 2017
The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.
READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017
Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.
READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017
Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.
READ MORE

Common Types of Ransomware

March 2, 2017
Ransomware is getting more sophisticated all the time, so prevention is key to avoid paying the ransom or losing data.
READ MORE

How to Stop Ransomware

January 31, 2017
Ransomware is a fast-growing security threat. Here's how to prevent it - or get rid of it if you have it.
READ MORE

Top SIEM Vendors and Other Buying Advice

October 13, 2016
Security incident and event management (SIEM) products are no longer just for large enterprises. This article will help determine if SIEM is for you.
READ MORE

7 Database Security Best Practices

August 23, 2016
Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.
READ MORE

5 Freaky but Real Application Security Threats

July 28, 2016
There are some new application security threats in town, and they are pretty scary.
READ MORE

Patch Management Software Buyer's Guide

July 19, 2016
Patch management software automates patch management, one of the most important security tasks in any organization.
READ MORE

How to Encrypt a Flash Drive Using VeraCrypt

July 5, 2016
Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.
READ MORE

What Is SQL Injection and How Can It Hurt You?

June 23, 2016
Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.
READ MORE

7 Full Disk Encryption Solutions to Check out

May 17, 2016
Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.
READ MORE

How to Get Identity Authentication Right

April 13, 2016
Identity authentication is especially important for high-value transactions, so it is important to get it right.
READ MORE

6 Ways to Make IAM Work for Third-Party Organizations

March 30, 2016
Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.
READ MORE

Everything You Need to Know about NGFW

March 23, 2016
Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.
READ MORE

Top 10 Ways to Secure a Windows File Server

February 17, 2016
Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.
READ MORE

What Are Your Container Security Options?

February 3, 2016
As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|