Jenna Phipps Avatar
  • mitre 2023 att&ck evaluations

    MITRE ATT&CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike & Cybereason Lead the Way

    MITRE Engenuity has released its 2023 ATT&CK evaluations, examining how top cybersecurity vendors detect and prevent sophisticated cyberthreats. This year, the evaluations focused on the techniques of Turla, a Russia-based threat group. Turla uses a command-and-control network, as well as open source tools, which are more difficult to protect and easier to exploit because anyone […]

  • A red open lock icon in a group of blue closed lock icon.

    Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

    Older unpatched vulnerabilities make hackers’ work easier: They can keep running tried-and-true exploits and just look for new victims. Unfortunately, the theme for this week is returning vulnerabilities, or ones that haven’t been excised quite yet. Some exploits and weaknesses have had fixes for months or longer, yet they keep showing up in the news, […]

  • IT asset management

    6 Best IT Asset Management (ITAM) Software

    Make informed decisions on IT asset management software. Compare features, integrations, and pricing. Find the perfect solution for your business needs.

  • developing an incident response plan

    How to Create an Incident Response Plan (+ Free Template)

    Learn how to establish an incident response plan that will help your business handle any potential security incident. Prevent data breaches and ensure the security of your organization.

  • Red data breach warning within binary values.

    How to Prevent Data Breaches: Data Breach Prevention Tips

    Data breach prevention can make or break your security efforts. Learn how to stop data breaches before they happen.

  • Digital shield with keyhole with a virtual map on the background.

    What Is Secure Remote Access?

    Secure remote access is a critical component of any organization’s security strategy. Learn more about its benefits and best practices.

  • Red virtual warning sign over a laptop keyboard.

    Living Off the Land Attacks: LOTL Definition & Prevention

    Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.

  • Virtual black cube with zero trust inscription on a technological design background.

    How to Enhance IAM by Adding Layers of Zero Trust

    Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.

  • network security

    8 Best User & Entity Behavior Analytics (UEBA) Tools

    User and entity behavior analytics (UEBA) tools are a relatively recent offering that help businesses better understand cybersecurity threats. Similar terms for the technology include user behavior analytics (UBA), threat analytics, and security analytics. Many others have simply packaged UEBA into broader security tools, such as security information and event management (SIEM) and extended detection […]

  • rootkit scanners

    5 Best Rootkit Scanners and Removers: Anti-Rootkit Tools

    A rootkit is a dangerous and stealthy malware type that enables hackers to take control of your system without your knowledge. Individuals and small businesses employ rootkit scanners to detect and remove rootkit malware. As “root” refers to operating system-level control, rootkits are serious threats indeed. Unfortunately, there is no guaranteed method for recovering an […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis