dcsimg

Applications - Article Archives - Page 1

9 Top Active Directory Security Tools

June 13, 2019 |

Active Directory is a widely used access management and authentication tool, but it can't protect against every security risk. Here are 9 Active Directory security tools that can help.

READ MORE

10 Top Single Sign-On Solutions

April 24, 2019 |

Single sign-on solutions can make access management easier for security teams, and the most sophisticated can adapt as risks change. Here are 10 of the best.

READ MORE

What Is Single Sign-On, and How Can It Make Your Enterprise More Secure?

March 15, 2019 |

We define single sign-on and how SSO solutions can be implemented to make your organization more secure.

READ MORE

DevSecOps: How to Build Security into Apps

March 13, 2019 |

We define DevSecOps, how it relates to DevOps, and how security can be built into the development process with minimal disruption.

READ MORE

9 Top Database Security Tools

February 27, 2019 |

Databases contain some of the most critical data in an organization. Here are 9 top database security tools to help you protect that data.

READ MORE

What is a Secure Web Gateway - And What Can One Do for You?

February 13, 2019 |

We define secure web gateway, including how web gateways compare to other security tools such as firewalls and CASBs, and where this important IT security market is headed.

READ MORE

9 Top Web Application Firewall (WAF) Vendors

January 25, 2019 |

We review nine of the top web application firewall (WAF) products to help you protect web-facing applications.

READ MORE

7 Tips for Container and Kubernetes Security

January 10, 2019 |

Simply deploying containers with a managed service isn't enough. Container security pros offer their tips to keep Kubernetes deployments safe and secure.

READ MORE

10 Top Container and Kubernetes Security Vendors

December 26, 2018 |

Containers can get applications running quickly, but that convenience comes with a number of security concerns. Here are the container security vendors that can help.

READ MORE

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018 |

Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.

READ MORE

Think Like a Hacker: An Offensive Approach to Enterprise Security

October 15, 2018 |

Find out how the CISO of an infamously breached website uses an Offensive Risk Management approach to improve the security of his organization.

READ MORE

The IT Security Mistakes that Led to the Equifax Breach

September 17, 2018 |

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made that IT security teams should learn from.

READ MORE

Application Security: How to Secure the Many Apps in Your Enterprise

September 12, 2018 |

These measures can help organizations find and fix security vulnerabilities in applications, whether the apps come from third parties or are developed in-house.

READ MORE

Protecting Against the 7 Vulnerabilities of Meltdown and Spectre

September 10, 2018 |

The biggest security vulnerabilities of 2018 are the Meltdown and Spectre flaws. What are they and what should you do to keep your organization safe?

READ MORE

5 Tips for Managing Privileged Access

September 06, 2018 |

Some accounts are more valuable than others. Privileged access management (PAM) can help secure them.

READ MORE

How Blackberry Does Secure Release Management

August 09, 2018 |

In a Black Hat USA session, BlackBerry's Product Security Operations Team director explained how organizations can improve their software release process to reduce vulnerabilities.

READ MORE

With So Many Eyeballs, Is Open Source Security Better?

July 10, 2018 |

VIDEO: Dirk Hohndel, VP and Chief Open-Source Officer at VMware, talks about how dev security should  be done, whether the code is open source or proprietary.

READ MORE

Container and Kubernetes Security: It's Complicated

June 13, 2018 |

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

READ MORE

10 Security Projects CISOs Should Consider: Gartner Analyst

June 12, 2018 |

And 10 they should have already done.

READ MORE