eSecurityPlanet Staff Avatar
  • Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

    Foster City, CA, Feb. 06, 2019 — eSecurityPlanet.com, a top online resource for IT security professionals and vendors, released its 2019 State of IT Security survey. This year’s results highlight an emerging gulf between companies ready to meet the growing perimeter and insider threats to their security, and those that aren’t, where one in three companies […]

  • Endpoint Detection and Response Selection Tool

    Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to stop advanced security threats. But picking the right EDR solution for your business can be a daunting task. We’re here to help. Answer a few simple questions to find out which […]

  • Considerations for Adding FIDO U2F to Your Security Protocol

    By Maxim Sovetkin, Itransition Millions of email and social networking logins and passwords become public almost every month. You don’t have to be an IT guru to realize that a password, no matter how complicated, is no longer an adequate security tool. The way users choose services is changing, adding more strains on security protocols. […]

  • How to Hire an Ethical Hacker

    By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website is most likely being targeted for hacking as you read this. If you’re a security manager, it really shouldn’t come as a surprise, though. Web apps are the most exploited […]

  • 2 Do’s and 2 Don’ts of Incident Response and Anomaly Detection

    By Alan Hall, Blue Coat (now part of Symantec) With the cost of a breach up 29 percent from 2013 — and continuing to rise — according to a recent Ponemon report, enterprise leaders are under mounting pressure to implement security solutions that are effective in detecting threats in this evolving cybersecurity landscape. While organizations […]

  • 5 Tips on Using OAuth 2.0 for Secure Authorization

    By Aleksey Gavrilenko, Itransition Approaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization standard that provides secure access to server resources. OAuth is a broad topic with hundreds of articles covering dozens of its aspects. This particular article will help you create a secure authorization […]

  • Must You Use Microsoft’s In-Box DNS?

    By Jeremy Moskowitz, PolicyPak Software In the case of your typical Windows domain network, it is “traditional wisdom” that only Microsoft DNS must be used with Active Directory for internal DNS resolution. Many times this is because: It’s convenient to use the in-box solution The myth that Active Directory requires Microsoft DNS to function properly […]

  • Ransomware and the Internet of Things: A Growing Threat

    Sekhar Sarukkai, Skyhigh Networks “If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and […]

  • 5 Steps to a Better Incident Response Plan

    By John Bruce, Resilient This is the decade of response. It’s officially arrived. After decades of focusing on preventing and detecting cyberattacks, security leaders are finally treating how they respond to cyber threats with equal priority. As the frequency, sophistication and volume of cyber threats continue to increase, organizations need the ability to respond to […]

  • Top 10 Ways to Secure a Windows File Server

    It’s a pretty safe bet that your company is storing valuable and confidential information on one or more Windows file servers right now. What may be less obvious is to what extent those servers have been appropriately hardened and locked down to protect the data from unauthorized access. If you’re not sure where to begin, […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis