Frank Ohlhorst

Enterprise Technology Analyst and Author. Frequent Contributor to eWeek, PCMag, The-Tech-Prophet.Com, ENP and several other online publications.
13 Posts

Secdo AI-Powered Incident Response Redefines Battle Against Malware

In the realm of cybersecurity, incident response has taken on new importance, especially...

VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

Cybersecurity is becoming an immensely complex subject to master, leaving many security...

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

No one can deny that enterprise endpoints must be protected. After all, most malware...

Sophos Intercept X Brings an End to Ransomware

IT security vendor Sophos is aiming to knock ransomware out of enterprise...

TrackVia Combines Low-Code Apps with Security Best Practices

In many cases, IT security has become a victim to digital transformations — a situation that has led to breaches and data...

TopSpin Makes Intelligent Deception a Hacker’s Worst Nightmare

Deception has proven itself as a valid form of defense for millennia — a fact to which militaries, nature and attorneys can...

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

Enterprise mobility is taking the business world by storm. It is poised to tear down the barriers that keep productivity at bay,...

Free Tool Fights Advanced Evasion Techniques

Because advanced evasion techniques can evade the detection capabilities of many firewalls, they are an especially dangerous weapon in the attackers' arsenal.The...

Fighting Advanced Persistent Threats with Emulation

It’s no secret that threats are growing in persistence, increasing in stealth and evading the latest malware technologies. Simply put, advances in...

Application Performance Management Offers Security Benefits

Applications are the king of the enterprise cloud, with companies making more applications available via the cloud in a quest to enhance...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...