John Iwuozor Avatar
  • face++

    Best Facial Recognition Software for Enterprises

    Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a code. It compares this code with its existing database to determine if an individual will be granted or denied access to a piece of information, equipment or premises. The technology […]

  • mitre deception tests

    MITRE Expands Security Testing to Services, Deception Tools & More

    MITRE is moving beyond its well-regarded endpoint security evaluations and will soon be testing other security services and products. MITRE recently issued a call for participation for ATT&CK Evaluations for Managed Services, designed to reveal how managed security service providers (MSSPs) and managed detection and response (MDR) respond to adversarial attacks. Except unlike its Enterprise […]

  • Netgear Nighthawk RAXE500

    The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

    Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard. Now, remote work is likely here to stay even after the pandemic is gone. That means that the temporary solutions put in […]

  • remote security

    NSA, CISA Release Guidance for Choosing and Hardening VPNs

    The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network (VPN) solutions. VPNs, an important security tool in an era of widespread remote work, are entry points into secured networks that bad attackers frequently try to use in malicious assaults. Because […]

  • fortinet linksys homewrk

    Securing Home Employees with Enterprise-Class Solutions

    The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when things return to normal. Remote work poses unique risks not addressed by traditional corporate network security, so it’s only natural that enterprise security vendors have been targeting work-at-home employees with more […]

  • zero day threat

    Zero-Day Threats: Preparation is the Best Prevention

    Zero-day threats can be the source of some of the most dangerous kinds of cyberattacks. Zero-day attacks take advantage of vulnerabilities that haven’t been discovered or are not publicly known yet. One of the things that makes these threats so dangerous is that they often come without warning, posing a huge risk to the companies […]

  • app security

    Neural Fuzzing: A Faster Way to Test Software Security

    Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the consequences are irreversible. In order to find these weaknesses, software security testers and developers often have to manually test the entire codebase and determine if any vulnerabilities exist. However, this […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis