dcsimg

Paul Rubens - Article Archives - Page 1

Symantec CloudSOC: CASB Product Overview and Insight

July 10, 2019
We review Symantec's CloudSOC, CASB technology acquired from Blue Coat Systems and aimed at enterprises with strong discovery, monitoring and DLP needs.
READ MORE

Proofpoint CASB: Product Overview and Insight

July 10, 2019
We review Proofpoint CASB, technology acquired from FireLayers that focuses on detecting and stopping threats.
READ MORE

8 Top CASB Vendors

July 10, 2019
A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review 8 top CASB products.
READ MORE

McAfee MVISION Cloud: CASB Product Overview and Insight

July 5, 2019
We review McAfee's MVISION Cloud, based on CASB technology acquired from Skyhigh Networks.
READ MORE

Data Storage Security: Best Practices for Security Teams

June 6, 2019
We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations.
READ MORE

How to Run a Threat Hunting Program

May 17, 2019
What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this important cybersecurity practice.
READ MORE

How to Comply with GDPR

May 10, 2019
In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant data privacy law in years.
READ MORE

2019 IT Security Employment Outlook: The Hottest Skills and Markets

January 3, 2019
With a need for 3 million IT security pros, cybersecurity remains a hot market. Here are the skills most in demand and the best places to find a job.
READ MORE

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 6, 2018
Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.
READ MORE

UEBA: Protecting Your Network When Other Security Systems Fail

November 20, 2018
User and entity behavior analytics (UEBA) can help organizations spot compromised applications and accounts, malicious insiders, and even APTs.
READ MORE

How to Control API Security Risks

November 15, 2018
Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.
READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018
Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.
READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

September 24, 2018
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018
A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.
READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018
A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.
READ MORE

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

June 26, 2018
Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.
READ MORE

What Is SQL Injection and How Can It Hurt You?

May 7, 2018
Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.
READ MORE

How to Prevent SQL Injection Attacks

May 2, 2018
Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.
READ MORE