eSecurityPlanet Staff

301 Posts

Top CASB Security Vendors for 2021

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application...

Best Enterprise Network Security Products

Maintaining the integrity of networks and data is a key consideration for every organization. With the digitalization...

Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

Foster City, CA, Feb. 06, 2019 -- eSecurityPlanet.com, a top online resource for IT...

eSecurity Planet Guide to RSA Conference 2018

The conferenceApril 16 - 20Moscone Center, San Francisco, CARSA websiteOur coverageApril 19, 2018RFP Lessons Learned from Monty Python: Oracle CSO: Oracle's CSO...

Endpoint Detection and Response Selection Tool

Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to...

Considerations for Adding FIDO U2F to Your Security Protocol

By Maxim Sovetkin, ItransitionMillions of email and social networking logins and passwords become...

10 Open Source Pentest Tools

10 Open Source Pentest Tools Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source. Penetration testing tools,...

10 Top Rootkit Scanners

A rootkit is a pernicious form of malware because it gains privileged access to a computer's operating system while hiding its presence from anti-virus...

Vulnerable Voting Machines Yet Another IoT Device to Secure

By Kasper Lindgaard, Secunia Research at Flexera SoftwareThis election season, voting machine security is probably not top of mind.  After all, 75...

How to Hire an Ethical Hacker

By Ryan O'Leary, WhiteHat SecurityIf your company develops web applications, I hope...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...