dcsimg

Paul Rubens - Article Archives - Page 1

Netskope for SaaS: CASB Product Overview and Insight

July 19, 2019
We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Bitglass Cloud Security: CASB Product Overview and Insight

July 19, 2019
We review Bitglass Cloud Security, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Microsoft Cloud App Security: CASB Product Overview and Insight

July 19, 2019
We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Symantec CloudSOC: CASB Product Overview and Insight

July 10, 2019
We review Symantec's CloudSOC, CASB technology acquired from Blue Coat Systems and aimed at enterprises with strong discovery, monitoring and DLP needs.
READ MORE

Proofpoint CASB: Product Overview and Insight

July 10, 2019
We review Proofpoint CASB, technology acquired from FireLayers that focuses on detecting and stopping threats.
READ MORE

8 Top CASB Vendors

July 10, 2019
A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review 8 top CASB products.
READ MORE

McAfee MVISION Cloud: CASB Product Overview and Insight

July 5, 2019
We review McAfee's MVISION Cloud, based on CASB technology acquired from Skyhigh Networks.
READ MORE

Data Storage Security: Best Practices for Security Teams

June 6, 2019
We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations.
READ MORE

How to Run a Threat Hunting Program

May 17, 2019
What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this important cybersecurity practice.
READ MORE

How to Comply with GDPR

May 10, 2019
In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant data privacy law in years.
READ MORE

Vulnerability Scanning: What It Is and How to Do It Right

April 5, 2019
Everything you need to know about vulnerability scanning: What it is, how it works, and how to use it as part of a vulnerability management program.
READ MORE

2019 IT Security Employment Outlook: The Hottest Skills and Markets

January 3, 2019
With a need for 3 million IT security pros, cybersecurity remains a hot market. Here are the skills most in demand and the best places to find a job.
READ MORE

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 6, 2018
Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.
READ MORE

UEBA: Protecting Your Network When Other Security Systems Fail

November 20, 2018
User and entity behavior analytics (UEBA) can help organizations spot compromised applications and accounts, malicious insiders, and even APTs.
READ MORE

How to Control API Security Risks

November 15, 2018
Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.
READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018
Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.
READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

September 24, 2018
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018
A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.
READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018
A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.
READ MORE