Paul Rubens - Article Archives - Page 1

How to Prevent DNS Attacks

October 18, 2017
Hackers are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
READ MORE

Managed Security Service Providers (MSSPs): Making IT Security Easier

October 2, 2017
IT security is one of the hardest challenges an organization faces. A managed security service provider (MSSP) can help - and save on costs. We tell you what an MSSP is and how to evaluate one.
READ MORE

Ransomware Insurance: Cyber Insurance May Be the Best Protection

August 25, 2017
Next to reliable data backups, a good cyber insurance policy may be your best protection against the damage wrought by ransomware attacks.
READ MORE

Six Top CASB Vendors

July 25, 2017
A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.
READ MORE

Cisco Cloudlock: CASB Product Overview and Insight

July 25, 2017
We review Cisco Cloudlock CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Microsoft Cloud App Security: CASB Product Overview and Insight

July 25, 2017
We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Skyhigh Networks: CASB Product Overview and Insight

July 25, 2017
We review Skyhigh Networks CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Bitglass Cloud Security: CASB Product Overview and Insight

July 25, 2017
We review Bitglass Cloud Security, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Forcepoint: CASB Product Overview and Insight

July 25, 2017
We review Forcepoint CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Netskope Active Platform: CASB Product Overview and Insight

July 25, 2017
We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

How to Achieve an Optimal Security Posture

July 5, 2017
Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.
READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

June 5, 2017
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Penetration Testing: DIY or Hire a Pen Tester?

April 25, 2017
The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.
READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017
Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.
READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017
Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.
READ MORE

Common Types of Ransomware

March 2, 2017
Ransomware is getting more sophisticated all the time, so prevention is key to avoid paying the ransom or losing data.
READ MORE

How to Stop Ransomware

January 31, 2017
Ransomware is a fast-growing security threat. Here's how to prevent it - or get rid of it if you have it.
READ MORE

7 Database Security Best Practices

August 23, 2016
Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.
READ MORE

5 Freaky but Real Application Security Threats

July 28, 2016
There are some new application security threats in town, and they are pretty scary.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|