dcsimg

Paul Rubens - Article Archives - Page 1

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 6, 2018
Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.
READ MORE

UEBA: Protecting Your Network When Other Security Systems Fail

November 20, 2018
User and entity behavior analytics (UEBA) can help organizations spot compromised applications and accounts, malicious insiders, and even APTs.
READ MORE

How to Control API Security Risks

November 15, 2018
Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.
READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018
Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.
READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

September 24, 2018
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018
A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.
READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018
A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.
READ MORE

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

June 26, 2018
Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.
READ MORE

What Is SQL Injection and How Can It Hurt You?

May 7, 2018
Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.
READ MORE

How to Prevent SQL Injection Attacks

May 2, 2018
Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.
READ MORE

How to Comply with GDPR

April 11, 2018
In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant new data privacy law in years.
READ MORE

Types of Firewalls: What IT Security Pros Need to Know

March 21, 2018
Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.
READ MORE

Email Security for Your Business

March 13, 2018
Every business uses email, yet many are unaware of email security threats. Here's what to worry about – and what to do about it.
READ MORE

2018 IT Security Employment Outlook: Which Security Skills and Certs are Hottest?

December 21, 2017
The cyber security skills shortage remains unfilled, so security pros can expect good pay and opportunities for the foreseeable future. So where are the openings and which skills and certs are in demand?
READ MORE

Open Source Patch Management: Options for DIYers

December 11, 2017
Patch management could prevent nearly half of all data breaches. There are few open source patch management options, but it's possible to build your own. We tell you how.
READ MORE

How to Achieve an Optimal Security Posture

November 15, 2017
Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.
READ MORE

Security Applications of Blockchain

November 10, 2017
Certificate authorities, key signings and DNS records are some of the ways Blockchain could make data and the web more secure and prevent DDoS attacks.
READ MORE

How to Prevent DNS Attacks

October 18, 2017
Hackers are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
READ MORE

Managed Security Service Providers (MSSPs): Making IT Security Easier

October 2, 2017
IT security is one of the hardest challenges an organization faces. A managed security service provider (MSSP) can help - and save on costs. We tell you what an MSSP is and how to evaluate one.
READ MORE