Paul Rubens - Article Archives - Page 1

2018 IT Security Employment Outlook: Which Security Skills and Certs are Hottest?

December 21, 2017
The cyber security skills shortage remains unfilled, so security pros can expect good pay and opportunities for the foreseeable future. So where are the openings and which skills and certs are in demand?
READ MORE

Open Source Patch Management: Options for DIYers

December 11, 2017
Patch management could prevent nearly half of all data breaches. There are few open source patch management options, but it's possible to build your own. We tell you how.
READ MORE

How to Achieve an Optimal Security Posture

November 15, 2017
Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.
READ MORE

Security Applications of Blockchain

November 10, 2017
Certificate authorities, key signings and DNS records are some of the ways Blockchain could make data and the web more secure and prevent DDoS attacks.
READ MORE

How to Prevent DNS Attacks

October 18, 2017
Hackers are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
READ MORE

Managed Security Service Providers (MSSPs): Making IT Security Easier

October 2, 2017
IT security is one of the hardest challenges an organization faces. A managed security service provider (MSSP) can help - and save on costs. We tell you what an MSSP is and how to evaluate one.
READ MORE

Ransomware Insurance: Cyber Insurance May Be the Best Protection

August 25, 2017
Next to reliable data backups, a good cyber insurance policy may be your best protection against the damage wrought by ransomware attacks.
READ MORE

Six Top CASB Vendors

July 25, 2017
A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.
READ MORE

Cisco Cloudlock: CASB Product Overview and Insight

July 25, 2017
We review Cisco Cloudlock CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Microsoft Cloud App Security: CASB Product Overview and Insight

July 25, 2017
We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Skyhigh Networks: CASB Product Overview and Insight

July 25, 2017
We review Skyhigh Networks CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Bitglass Cloud Security: CASB Product Overview and Insight

July 25, 2017
We review Bitglass Cloud Security, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Forcepoint: CASB Product Overview and Insight

July 25, 2017
We review Forcepoint CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

Netskope Active Platform: CASB Product Overview and Insight

July 25, 2017
We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

June 5, 2017
Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.
READ MORE

Penetration Testing: DIY or Hire a Pen Tester?

April 25, 2017
The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.
READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017
Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.
READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017
Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.
READ MORE

Common Types of Ransomware

March 2, 2017
Ransomware is getting more sophisticated all the time, so prevention is key to avoid paying the ransom or losing data.
READ MORE