Applications

Top SD-WAN Solutions for Enterprise Security

The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide...

Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk

The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j component for various online services, amo...

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Palo Alto Unveils Zero Trust 2.0, Says Current Solutions Inadequate

Palo Alto Networks says current zero trust solutions don't go far enough, so today the cybersecurity leader urged the industry to transition to what it's calling Zero Trust Network Access 2.0 (ZTNA ...

Getting Started with the Burp Suite: A Pentesting Tutorial

Burp is one of the top-rated security suites for pentesting and ethical hacking. While there are paid professional and enterprise editions, you can install the community edition for free and even use...

Security Researchers Find Nearly 400,000 Exposed Databases

Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues. Researchers at Singapore-based cybersecurity company Group-IB recently discovered tho...

MFA Advantages and Weaknesses

Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Yet i...

Top 10 Open Source Vulnerability Assessment Tools

Unlike penetration tests, vulnerability tests do not consist of performing real attacks. However, they’re no less valuable, as they can spot vulnerabilities missed by a penetration test and provide a ...

How to Prevent Web Attacks Using Input Sanitization

Despite all the security measures you might take, a codebase can be the weakest link for any business’s cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. Sanitizin...

10 Top Active Directory Security Tools for 2022

Identity management plays a critical role in every IT security strategy. Microsoft’s identity and access management tools dominate the enterprise market, with more than a 50% market share between Acti...

Latest articles