Paul Shread

eSecurity Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including an award-winning series on software-defined data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.
14 Posts

Cybersecurity Outlook 2021: Trends and Predictions

Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...

Check Point vs Palo Alto: EDR Solutions Compared

This is one of those articles that's fun to write because there is virtually no downside to these two endpoint detection and response (EDR)...

SASE: Securing the Network Edge

Dramatic growth in Internet of Things (IoT) devices and external users have forced IT departments to move storage and processing functions closer to the...

Kaspersky vs. Bitdefender: EDR Solutions Compared

Kaspersky and Bitdefender have very good endpoint security products for both business and consumer users, so they made both our top EDR and top...

Best Antivirus Software for 2021

What's the best antivirus software? We at eSecurity Planet have our own views and methodology on this much-debated issue. First, our views are influenced by...

Best IAM Software

    The identity and access management (IAM) market is going through significant changes, as behavior analytics and zero trust become an increasingly important part of...

Top Endpoint Detection and Response (EDR) Solutions

Endpoint security is a cornerstone of IT security, so our team put considerable research and analysis into this list of top endpoint detection and...

Over Half of Companies Are Upping Spending on IT Security

Driven by fear of data breaches and new privacy regulations, such as Europe's General Data Protection Regulation (GDPR), large enterprises are spending...

Ten Top Next-Generation Firewall (NGFW) Vendors

Next-generation firewalls (NGFWs) are at the core of an enterprise security strategy, and the best ones incorporate policy enforcement for applications and user control,...

Our Top Security Vendor Methodology

We gather information from a range of IT industry sources for our top...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...