Foster City, CA, Feb. 06, 2019 — eSecurityPlanet.com, a top online resource for IT security professionals and vendors, released its 2019 State of IT Security survey. This year’s results highlight an…
Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to stop advanced security threats. But picking…
By Maxim Sovetkin, Itransition Millions of email and social networking logins and passwords become public almost every month. You don’t have to be an IT guru to realize that a…
By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website is most likely being targeted…
By Aleksey Gavrilenko, Itransition Approaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization standard that provides secure access to server…
By Jeremy Moskowitz, PolicyPak Software In the case of your typical Windows domain network, it is “traditional wisdom” that only Microsoft DNS must be used with Active Directory for internal…
Sekhar Sarukkai, Skyhigh Networks “If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would…
By John Bruce, Resilient This is the decade of response. It’s officially arrived. After decades of focusing on preventing and detecting cyberattacks, security leaders are finally treating how they respond…
It’s a pretty safe bet that your company is storing valuable and confidential information on one or more Windows file servers right now. What may be less obvious is to…