dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Cyberspace Operations Infrastructure (CSOI): A Revolutionary Approach to Cyber Security

Federal agencies require robust, sophisticated protection from all attack vectors. Yet, few existing solutions provide the comprehensive coverage agencies demand, much less the flexibility to fight an active threat while adjusting an enterprise’s overall cyber posture. Federal …

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …

KuppingerCole Leadership Compass for Cloud-based MFA Solutions

KuppingerCole evaluates 12 vendors’ services on a variety of use cases and technical capabilities around cloud-based MFA. The report identifies top solution providers in the market, evaluating each vendor against core functionalities and innovative approaches. It also includes …

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, …