Jeff Goldman

Jeff Goldman is an eSecurity Planet contributor.
1833 Posts

IT Security Vulnerability Roundup: June 2019

While it can be challenging to keep up with the wide range of security flaws disclosed each month, it's worth paying attention...

IT Security Vulnerability Roundup: May 2019

IT security is all about staying on top of vulnerabilities. Many of those...

One Year into GDPR: What’s Changed?

The EU's General Data Protection Regulation (GDPR) was implemented a year ago on...

IT Security Vulnerability Roundup: April 2021

With dozens if not hundreds of security vulnerabilities disclosed every month, it can...

How to Conduct a Vulnerability Assessment: 5 Steps toward Better Cybersecurity

In today's threat environment, it's not just a good idea to conduct a cybersecurity vulnerability assessment, and to do so on a...

FireEye vs McAfee: Top EDR Solutions Compared

FireEye's and McAfee's endpoint security solutions have much to offer enterprise users. While FireEye appears on eSecurity Planet's list of top endpoint...

IT Security Vulnerability Roundup: March 2021

Every month, a wide range of security vulnerabilities are uncovered and disclosed -- below, we take a closer look at 14 of...

FireEye vs Cisco: Top EDR Solutions Compared

FireEye's and Cisco's endpoint security solutions both made eSecurity Planet's list of top endpoint detection and response (EDR) solutions, and each product...

IT Security Vulnerability Roundup: February 2021

Several new security vulnerabilities are found and disclosed on a monthly basis – below, we look at 12 flaws that were disclosed...

Carbon Black vs McAfee: Top EDR Solutions Compared

Download our free EDR Vendor Report based on nearly 300 real user experiences.Endpoint security solutions from McAfee and Carbon Black both offer...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...