dcsimg

Applications - Article Archives - Page 2

How to Set Up and Implement DMARC Email Security

January 24, 2018 |

Curious about DMARC? Learn how to set up a basic DMARC email security policy, including SPF and DKIM, in this eSecurity Planet tutorial.

READ MORE

10 Top Patch Management Solutions

January 19, 2018 |

Patch management might be the single most important security tool. We review 10 of the top patch management solutions.

READ MORE

What is DMARC and How Does it Improve Email Security?

January 12, 2018 |

The U.S. government is adopting DMARC to help improve email security, and most organizations should too. Learn the basics in this eSecurity Planet article.

READ MORE

Simility's AI-Enabled Fraud Prevention Technology Attracts $17.5M Investment

December 12, 2017 |

The startup's SaaS platform uses machine learning to help enterprises avoid costly scams. 

READ MORE

Open Source Patch Management: Options for DIYers

December 11, 2017 |

Patch management could prevent nearly half of all data breaches. There are few open source patch management options, but it's possible to build your own. We tell you how.

READ MORE

Prevoty Rakes in $13 Million in New Funding

December 07, 2017 |

The company's platform delivers real-time application monitoring and protection.

READ MORE

Alcide Exits Stealth Mode with $5.2 Million in Funding

December 07, 2017 |

The cloud-friendly security startup launches its network security platform after attracting an investment from Intel.

READ MORE

NeuVector Courts Large-Scale Enterprise Container Deployments

November 13, 2017 |

Version 1.3 of the application container security solution marks the arrival of a new Enterprise edition.

READ MORE

Security Applications of Blockchain

November 10, 2017 |

Certificate authorities, key signings and DNS records are some of the ways Blockchain could make data and the web more secure and prevent DDoS attacks.

READ MORE

Container Security Startup NeuVector Raises $7 Million

November 07, 2017 |

The container firewall specialist will use the funds to bulk up its engineering and sales operations amid intensifying demand for its solution.

READ MORE

WordPress 4.8.3 Fixes Critical SQL Injection Vulnerability

November 01, 2017 |

Researcher blasts security practices at widely used open-source CMS project as not being responsive enough.

READ MORE

Averon Banks $8.3 Million, Promises 'Frictionless' Mobile Authentication

October 24, 2017 |

The company's Direct Autonomous Authentication technology allows smartphone users to securely access services and other compatible devices without a separate download.

READ MORE

Contrast Security Secures $30 Million in New Funding

October 19, 2017 |

The application security specialist scores additional VC funding amid a cloud software boom.

READ MORE

Barracuda Debuts Active DDoS Prevention Service

October 17, 2017 |

The new cloud-based service provides businesses with both application security and protection from debilitating DDoS attacks.

READ MORE

The Secure Supply Chain: Where Security Starts

October 09, 2017 |

The next big front in the cyber security war could be the supply chain - and regulators are already looking at it.

READ MORE

Aqua Security Secures $25 Million in Funding for Container Security

September 19, 2017 |

The startup sets a record for container security funding amid intensifying demand from enterprises.

READ MORE

WhiteHat Launches Secure DevOps Learning Labs

September 13, 2017 |

The new online learning and resource hub helps enterprise developers build secure apps from the start.

READ MORE

Unpatched Open Source Software Flaw Blamed for Massive Equifax Breach

September 11, 2017 |

The Apache Struts security flaw had been disclosed in March of 2017.

READ MORE

Plurilock's AI Authentication Tech Enlists in the Army

August 23, 2017 |

The U.S. Army's NETCOM unit will use Plurilock's BioTracker cybersecurity software to safeguard identities.

READ MORE

10 Top IAM Products

August 23, 2017 |

Identity and access management products control network and data access for users and devices across cloud and on-premises environments. We review 10 of the best IAM solutions.

READ MORE