eSecurityPlanet Staff

301 Posts

Best CASB Security Vendors for 2021

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity. With the adoption of...

Best Enterprise Network Security Solutions for 2021

    Maintaining the integrity of networks and data is a key consideration for every organization. With the digitalization of almost every aspect of business, robust...

Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

Foster City, CA, Feb. 06, 2019 -- eSecurityPlanet.com, a top online resource for IT...

eSecurity Planet Guide to RSA Conference 2018

The conferenceApril 16 - 20Moscone Center, San Francisco, CARSA websiteOur coverageApril 19, 2018RFP Lessons Learned from Monty Python: Oracle CSO: Oracle's CSO...

Endpoint Detection and Response Selection Tool

Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to...

Considerations for Adding FIDO U2F to Your Security Protocol

By Maxim Sovetkin, ItransitionMillions of email and social networking logins and passwords become...

10 Open Source Pentest Tools

10 Open Source Pentest Tools Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source. Penetration testing tools,...

10 Top Rootkit Scanners

A rootkit is a pernicious form of malware because it gains privileged access to a computer's operating system while hiding its presence from anti-virus...

Vulnerable Voting Machines Yet Another IoT Device to Secure

By Kasper Lindgaard, Secunia Research at Flexera SoftwareThis election season, voting machine security is probably not top of mind.  After all, 75...

How to Hire an Ethical Hacker

By Ryan O'Leary, WhiteHat SecurityIf your company develops web applications, I hope...

Latest articles