dcsimg

Applications - Article Archives - Page 4

Top 10 Enterprise Encryption Products

August 15, 2017 |

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

READ MORE

Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

July 17, 2017 |

The company's new dynamic firewall technology ensures that only legitimate traffic gets through.

READ MORE

Microsoft Patches 19 Critical Vulnerabilities in July Patch Tuesday Update

July 12, 2017 |

A total of 54 flaws in total are now patched, including a critical issue in the HoloLens VR technology.

READ MORE

SiteLock's SMART/DB Protects SMB WordPress Websites

June 16, 2017 |

The company launches a private beta of its security solution for WordPress databases.

READ MORE

11 Top Security Technologies for 2017

June 16, 2017 |

Key technologies, according to Gartner, will range from cloud workload protection platforms to managed detection and response solutions.

READ MORE

Trusona Raises $10M to Kill Passwords

June 15, 2017 |

The startup raises attracts millions of dollars from Microsoft Ventures and Kleiner Perkins.

READ MORE

Almost Half of All Third-Party Software Components Are Outdated, Insecure

June 15, 2017 |

In almost every case, a more secure version of the software component is available, a recent study found.

READ MORE

IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops

June 14, 2017 |

IBM Cloud Identity Connect brings secure single sign-on capabilities to businesses looking to manage user access on-premises and in the cloud.

READ MORE

Google Patches Android and Chrome for Security Vulnerabilities

June 06, 2017 |

Android June update and Chrome 59 provide fixes for security flaws.

READ MORE

OneLogin Password Manager Hacked

June 05, 2017 |

All customers served by the company's U.S. data center are affected.

READ MORE

WordPress 4.7.5 Fixes Six Security Vulnerabilities

May 19, 2017 |

Widely deployed open-source content management system patched for a half-dozen different issues as new bug bounty program is set to debut.

READ MORE

Securing Docker, One Patch at a Time

April 24, 2017 |

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Web Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Web application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017 |

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Multi-Factor Authentication: A Critical Security Tool for Enterprises

March 14, 2017 |

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

READ MORE

Securing MySQL DBMS

January 20, 2017 |

These steps can help you secure your deployment of the open source MySQL Community Server.

READ MORE

Linux Foundation Restructuring CII Security Effort for Scale

August 31, 2016 |

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



READ MORE

Startup Spotlight: Twistlock's Container Security

July 21, 2016 |

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

READ MORE