Drew Robb Avatar
  • Laptop computer displaying logo of IBM.

    IBM X-Force Exchange Threat Intelligence Platform

    The top-ranked IBM X-Force Exchange threat intelligence platform (TIP) integrates enterprise-grade external security threat information with the tools a security professional needs to analyze how the threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see the complete list of […]

  • Cybersecurity hacker

    Security Outlook 2023: Cyber Warfare Expands Threats

    After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. “In 2022, governments fought wars online, businesses were affected by multiple ransomware gangs, and regular users’ data was constantly on hackers’ radars,” said […]

  • patch management, cloud, network security

    10 of the Best Patch Management Service Providers

    Patch management services are becoming increasingly popular as the number of software and application vulnerabilities demanding fixes has overwhelmed IT and security teams. A major selling point of patch management services (and broader vulnerability management services) is that they reduce, if not eliminate, the time and attention required of IT personnel to update and patch […]

  • A person writes code on a computer.

    Vulnerability Management as a Service (VMaaS): Ultimate Guide

    There are 20,000 or more new software and hardware vulnerabilities every year. It falls to IT security teams to determine where those vulnerabilities lie in their organization and which ones they need to prioritize. That process can be overwhelming. Vulnerability management tools can help, but even then, finding, patching and testing vulnerabilities can still take […]

  • patch and vulnerability management as a service

    Is the Answer to Vulnerabilities Patch Management as a Service?

    Patch management is all about helping organizations manage the process of patching software and applications. It encompasses functions such as testing patches, prioritizing them, deploying them, verifying that they are installed in all endpoints, and in general looking after every aspect of patching. But patching can be a time-consuming – and ineffective – task. There […]

  • Microsoft Endpoint Management dashboard.

    Top Unified Endpoint Management (UEM) Solutions

    Unification has been a trend in IT for a long time, whether it’s communications, storage, data management or other technologies, and the trend hasn’t escaped cybersecurity either, as products converge into more comprehensive platforms like XDR or SASE. Endpoint technologies are the latest to join the unification craze, as endpoint security and mobile device management […]

  • Sophos XG Firewall Review: Pricing & Features

    Sophos Firewalls are good candidates for mid-sized and distributed enterprises and those already using Sophos’ endpoint protection solution. Dedicated remote branch devices and an easy-to-learn management interface are also strengths. Founded in 1985, Sophos addresses endpoint, network, encryption, web, email, and mobile security. The company protects more than 500,000 organizations and millions of consumers in […]

  • Hacker at computer

    Businesses Secretly Pentest Partners as Supply Chain Fears Grow

    Cybercriminals learn quickly. In a couple of decades’ time, they’ve gone from pretending to be Nigerian princes to compromising the entire software supply chain, and every day brings news of a new attack technique or a clever variation on an old one. Incidents like those that rattled SolarWinds and Kaseya and their downstream customers changed […]

  • hacked

    Security Training: Moving on from Nick Burns Through Better Communication

    Twenty years ago, Saturday Night Live nailed a tendency in IT to be overly absorbed in tech-speak and to do a poor job of educating users. The Nick Burns: Your Company Computer Guy skits showed rude IT guys belittling users as they fixed their “stupid” problems. A recent experience highlighted that security awareness training and […]

  • ransomware prevention

    How One Company Survived a Ransomware Attack Without Paying the Ransom

    The first signs of the ransomware attack at data storage vendor Spectra Logic were reports from a number of IT staffers about little things going wrong at the beginning of the day. Matters steadily worsened within a very short time and signs of a breach became apparent. Screens then started to display a ransom demand, […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis