Paul Shread

eSecurity Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including an award-winning series on software-defined data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.
10 Posts

Apple White Hat Hack Shows Value of Pen Testers

The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties...

Employees and Data Backup Top Cybersecurity Awareness Month Concerns

October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain,...

CrowdStrike vs Carbon Black: Top EDR Solutions Compared

CrowdStrike Falcon and VMware Carbon Black are popular endpoint detection and response (EDR) products, and both scored...

Top Zero Trust Security Solutions

Zero trust security is a concept that's been around for several years, but it may finally be...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list...

Best SIEM Tools & Software for 2021

Security Information and Event Management (SIEM, pronounced "sim") is a key enterprise security technology, with the ability...

Gartner’s Top IT Security Projects for 2021

  At this week's Gartner Security Summit in National Harbor, Maryland, Gartner analyst Brian Reed outlined 10 cybersecurity projects that could help enterprises reduce security risk. Reed also...

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week's Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil...

Bank’s Tape Loss Puts Spotlight on Backup Practices

Bank of America's admission on Friday that the company lost data tapes containing...

One in Three Companies Lack Disaster Recovery Strategy

About 30% of companies lack a formal disaster recovery strategy, and 64% of...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...