LATEST ARTICLES

Managed Services: A Security Problem and Solution

|

Almost any IT function can be purchased as a service, even security. We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

Cyber Insurance: Insuring Your Data When Protecting It Fails

|

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

Application Firewalls: Protecting Web Applications from Attacks

|

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

|

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Sophos Intercept X Brings an End to Ransomware

|

Intercept X from Sophos brings a bandolier of silver bullets to the ransomware fight, leaving cybercriminals scattering for cover.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

A CIO's Guide to the Digital Workplace

Facing down consumerization, the millennial factor and BYOD Gartner defines Digital Workplace as enabling new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies*. To us, put simply, it's a unified workplace where …

How to Fight Ransomware with Unity« Active Archive

Of all the cybercriminal threats out there, being attacked by ransomware is among the most devastating. And here's the real issue: Anti-malware products are not infallible, and when they fail, conventional computer architectures readily allow data corruption by malware that masquerades as …

Realizing the Promise of a Data Lake 

As the market's enthusiasm for modern big data architecture continues, the promise of the data lake continues to elude many. Mainstream production implementations in industries as varied as retail, health, and financial services are becoming more and more common. To ensure that a data lake …

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Live Event Date: June 29, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster. IBM QRadar on Cloud is a …
 
SEE ALL WHITEPAPERS
 
TrackVia Combines Low-Code Apps with Security Best Practices

TrackVia Combines Low-Code Apps with Security Best Practices

|

The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.

READ MORE
NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

|

NetMotion Mobility combines provisioning, governance and security into a package any network admin could love.

READ MORE
Single Sign-On Buying Guide

Single Sign-On Buying Guide

|

Deploying a single sign-on system can improve productivity and lead to better password hygiene, but it also carries some risks.

READ MORE
3 Noteworthy Windows Server 2016 Security Features

3 Noteworthy Windows Server 2016 Security Features

|

Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.

READ MORE