eSecurityPlanet Staff Avatar
  • 3 Facts about Sandbox-based Gateway Appliances

    By Sanjay Katkar, CTO, Quick Heal Technologies Sandbox-based gateway security appliances are widely used in enterprises both large and small, for plenty of good reasons. They are popular, effective, easy to implement and often inexpensive. These appliances employ a variety of tools to block new, unknown malware along with targeted attacks found in email attachments […]

  • 5 Tips to Protect Networks Against Shodan Searches

    A recent round of media buzz has swarmed around the search engine called Shodan. If you’ve seen any stories like this or this, you’ve read that Shodan may be “the scariest search engine on the Internet.” The penetration testing search engine, it is said, reveals critical infrastructure like network servers, routers and even printers, empowering […]

  • How VMI Can Improve Cloud Security

    By Nazar Tymoshyk, SoftServe Following Einstein’s wisdom, let me explain why cloud security is important, in terms that make sense to a six-year-old. Imagine that you have antivirus software installed on your computer that tries to stop attacks directed against it. If that computer is connected to the cloud, it’s connected to other computers and […]

  • Top 10 Encryption Tools You Should Know

    Encryption tools protect sensitive data from third parties. But encryption does not guarantee that files, removable media, email messages and network packets will not be hacked. Poorly written user authentication policies, configuration mistakes, social engineering and tool restrictions can all create problems. To catch these vulnerabilities, administrative policies on continuous testing and monitoring of encrypted […]

  • Using Hadoop to Reduce Security Risks

    By Ted Dunning, MapR Technologies Data has become too large to analyze with traditional tools, so companies are upping their security game by moving away from traditional approaches and instead using a combination of Apache Hadoop and advanced analytics to help predict, identify and deter security threats. Hadoop can improve enterprise security in several different […]

  • 5 Ways to Make Public Cloud More Secure

    By Chad Whalen, Fortinet More businesses than ever are moving their business operations – in part or in whole – to the cloud. An IDG Enterprise study found 69 percent of businesses have at least one application or a portion of their computing infrastructure in the cloud as of 2014 and another 18 percent are […]

  • How to Choose the Right Security Testing Tool

    By Stanislav Breslavskyi and Nazar Tymoshyk, SoftServe Sooner or later, any expert involved in software or computer systems development and maintenance processes will face security questions. To find solutions, they’ll need security tools. Let’s define the types of security tools and their roles in different kind of projects and development stages. Picking the right tool […]

  • 5 Free Tools for Compliance Management

    Many organizations must comply with regulations such as HIPAA, and the numbers are growing, fueled by constantly evolving legislation that creates new rules, requirements and auditing procedures. Security compliance requirements are often seen as an unnecessary burden that was legislated into existence to protect external entities. However, properly enforced compliance policies can protect organizations from a […]

  • 4 Lessons Learned from the POODLE Hack

    By Nazar Tymoshyk and Stanislav Breslavskyi The growing list of recent red-letter security vulnerabilities—Beast, Heartbleed, Shellshock—was recently extended with a new threat, POODLE. No matter how fluffy your associations with this word are, the term sends shivers down the spine of those who use SSLv3 protocol. POODLE stands for Padding Oracle on Downgraded Legacy Encryption, […]

  • Intrusion Detection Systems: a Primer

    By Nazar Tymoshyk, SoftServe For developers and end users of today’s software,?security is a matter of mounting concern, regardless of whether it is private or business data that needs protection. Many people view security exclusively in black and white: Either a system is damaged, or it is safe and sound. However, digging a bit deeper […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis