dcsimg

Sean Michael Kerner - Article Archives - Page 1

Most Companies Are Confident in Their Compliance Controls: eSecurity Planet Survey

February 11, 2019
Companies are more confident in their ability to meet GDPR and other compliance demands, but some important controls like GRC and DLP haven't been fully adopted.
READ MORE

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

February 8, 2019
Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance.
READ MORE

A third of companies are largely unprepared for cybersecurity attacks: eSecurity Planet Survey

February 7, 2019
A surprising number of organizations are not taking necessary steps to reduce cyber risk.
READ MORE

Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows

February 5, 2019
Enterprises understand the urgent need for stronger cybersecurity measures — even if they're slow to adopt them, research shows.
READ MORE

7 Tips for Container and Kubernetes Security

January 10, 2019
Simply deploying containers with a managed service isn't enough. Container security pros offer their tips to keep Kubernetes deployments safe and secure.
READ MORE

10 Top Container and Kubernetes Security Vendors

December 26, 2018
Containers can get applications running quickly, but that convenience comes with a number of security concerns. Here are the container security vendors that can help.
READ MORE

Alert Logic: Container Security Product Overview and Analysis

December 26, 2018
Alert Logic uses machine learning, data analytics and expert analysis to quickly detect container threats.
READ MORE

Aqua Security: Container Security Product Overview and Analysis

December 26, 2018
The Aqua Container Security Platform is a comprehensive solution for securing containerized environments, supporting Linux and Windows containers and on-premises and cloud deployment.
READ MORE

Capsule 8: Container Security Product Overview and Analysis

December 26, 2018
Capsule8 provides a real-time, zero-day attack detection platform capable of automatically disrupting attacks.
READ MORE

NeuVector: Container Security Product Overview and Insight

December 26, 2018
NeuVector's multi-vector container security platform provides integrated, automated security for Kubernetes, Docker and Red Hat OpenShift.
READ MORE

Twistlock: Container Security Product Overview and Analysis

December 26, 2018
Twistlock's container security platform goes beyond containers to secure the entire cloud native stack, from the host OS to serverless functions.
READ MORE

Aporeto: Container Security Product Overview and Analysis

December 26, 2018
Aporeto's container security platform uses application context to enforce authentication, authorization, and encryption policies.
READ MORE

Sysdig: Container Security Product Overview and Analysis

December 26, 2018
Our in-depth look at the Sysdig cloud-native intelligence platform, which monitors and secures millions of containers across hundreds of enterprises.
READ MORE

StackRox: Container Security Product Overview and Analysis

December 26, 2018
An in-depth look at the StackRox Container Security Platform, which provides security across the entire container life cycle.
READ MORE

Qualys Container Security: Product Overview and Analysis

December 26, 2018
An in-depth look at Qualys Container Security, which discovers, tracks and continuously secures containers from the DevOps pipeline to runtime deployments.
READ MORE

Cybersecurity Research Reveals IoT Vulnerabilities, Nation-State Threats

December 21, 2018
We examine 7 cybersecurity research reports released in November -- and the controls organizations should consider.
READ MORE

How Military Tactics Apply to Cybersecurity

December 18, 2018
VIDEO: Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that.
READ MORE

IT Security Lessons from the Marriott Data Breach

December 4, 2018
500 million people are at risk because of a data breach at Marriott's Starwood hotel chain. What steps can your organization take to limit the risk of suffering the same fate?
READ MORE