Fortinet vs Palo Alto Net...

A next-generation firewall (NGFW) is an important component of network security and represents the third generation of firewall technology. NGFWs provide capabilities beyond that of a traditional, stateful firewall, including cloud-delivered threa...

China’s Data Privac...

Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been criticized as being more vague in its wording and har...

Top IT Asset Management T...

IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also offer some kind of security resiliency to protect th...

Best Cybersecurity Awaren...

Cybersecurity training for employees has come a long way in the last few years. Back in the day, security training was largely reserved for IT security specialists and then extended to include IT personnel in general. These days, all employees need t...

IT Security Resources

Latest Security News and Analysis

Endpoint Articles

MITRE Expands Security Te...

MITRE is moving beyond its well-regarded endpoint security evaluations and will soon be testing other security services and products. MITRE recently issued a call for participation for ATT&CK Evaluations for Managed Services, designed to revea...

Bitdefender vs. McAfee: C...

Endpoint security software is designed to detect, avert, and eradicate malware on endpoint devices like desktop computers, laptops, network servers, and mobile phones. Endpoint security solutions are available in three forms—personal, small and mid-s...

Top Secure Email Gateway ...

Email is typically the channel through which ransomware and malware are unleashed upon the enterprise. Phishing scams use it to compromise networks. Executives are conned by fake emails into sending funds to the wrong places - or worse, giving up the...

Cybersecurity Mesh, Decen...

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that hav...

Top Products

Popular categories