NordLayer Review: A VPN for the Zero Trust Era

Many companies use Virtual Public Networks (VPNs) to connect between their remote resources and their local networks. However, many of these VPN solutions have three significant issues. First, VPNs can be difficult to set up, secure and maintain....

15 Top Cybersecurity Certifications for 2022

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training and testing), it's important to make sure that the ...

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored on SharePoint and OneDrive. Microsoft services a...

Zero Trust: Hype vs. Reality

Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall-perimeter model of cybersecurity equally obsolete. No longer is traffic inside the network automatic...

IT Security Resources

Latest Security News and Analysis

Endpoint Articles

IT Buyers Don’t Take Security Seriously Enough: HP

Given the insane security environment we are in, it may seem weird to suggest that a tech company is too good at security. How can you be too good at something that is critical to the safety and operational resilience of companies and nations? Se...

Why You Need to Tune EDR to Secure Your Environment

Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to deploy very quickly, but it also allows for a numb...

Top Data Loss Prevention (DLP) Solutions

In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that data is more sensitive than others. Sensitive data c...

How to Prevent Web Attacks Using Input Sanitization

Despite all the security measures you might take, a codebase can be the weakest link for any business’s cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. Sanitizing consists of removing any unsafe character from u...

Top Products

Popular categories