Drew Robb Avatar
  • Penetration test inscription on a digital background.

    8 Best Linux Distros for Forensics & Pentesting

    Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.

  • Blue shield with lock emblem in a binary digits background.

    LogRhythm vs Splunk: Top SIEM Solutions Compared

    A look at the strengths and weaknesses of LogRhythm and Splunk, two market-leading SIEM systems.

  • Checkpoint vs Palo Alto Networks

    Check Point vs Palo Alto Networks: Top NGFWs Compared

    Check Point and Palo Alto Networks are two of the top next-generation firewall vendors (NGFWs) and both appear on eSecurity Planet’s list of the top NGFW products and the top cybersecurity companies too. Security buyers in the market for NGFWs often compare the two, and with good reason. Palo Alto and Check Point are both […]

  • wfuzz

    24 Top Open Source Penetration Testing Tools

    Open-source penetration testing tools are freely available software that help pentest teams identify areas of weakness in their systems. Teams often need a variety of tools to perform a full penetration test, so using the wide range of open-source pentesting tools helps them keep their costs down. And many pentesters are already familiar with well […]

  • sophos firewall management

    Sophos XGS vs Fortinet FortiGate: Top NGFWs Compared

    Sophos and Fortinet both appear on our list of the top next-generation firewalls (NGFWs), and while both offer very good security at their price points, they serve very different markets. What follows is a look at the key features and strengths and weaknesses of each solution. Which one is best for you will depend on […]

  • What Is Managed Detection and Response? Guide to MDR

    Managed detection and response (MDR) goes beyond other managed security services by essentially giving organizations their own expert security analyst team to help identify and respond to cyber threats. The emergence of MDR was in many ways inevitable. Security has become so time-consuming and complex that many organizations have realized, vital though the function is, […]

  • Looking Glass threat intelligence logo

    LookingGlass Cyber Solutions: Threat Intelligence Review

    The LookingGlass scoutPrime threat intelligence platform (TIP) integrates enterprise-grade external security threat information with information on internal architecture and security information to create actionable, prioritized risk scores for threats. The TIP provides security professionals with accelerated analysis of how threats might impact the organization and how to counter those threats. This article provides more in-depth […]

  • Prisma Cloud container security dashboard

    Twistlock: Prisma Cloud Container Security Overview and Analysis

    At the time it was acquired by Palo Alto Networks in late 2018, Twistlock was in use by 25% of the Fortune 100. Its automated and scalable container cybersecurity platform has now been incorporated into Palo Alto’s Prisma Cloud. Since the acquisition, Palo Alto Prisma has added Twistlock’s functions to a larger suite of cloud-based […]

  • Anomali ThreatStream: Threat Intelligence Product Overview and Insight

    The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see our list of the top […]

  • Solarwinds Network Configuration Manager dashboard

    SolarWinds Security Event Manager – SIEM Product Overview and Insight

    SolarWinds lacks the full security suite presence of some competitors, but is well-integrated across a variety of bonus IT operation capabilities such as threat intelligence platform capabilities, privileged access management, USB security, and botnet detection. These additional capabilities make  the SolarWinds SEM a good fit for SMEs who may lack their own internal security teams […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis