Pedro Hernandez

Pedro Hernandez is a contributor to eSecurity Planet, eWEEK, and the IT Business Edge Network. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.
118 Posts

Security Awareness Training for Employees for 2021

Enterprises spend nearly $100 billion a year on cybersecurity, and despite sophisticated IT...

Top GDPR Compliance Security Companies & Solutions 2021

The European Union's new General Data Protection Regulation (GDPR) has ushered in sweeping...

APT Attacks & Prevention

An advanced persistent threat can be as scary as it sounds. Gone undetected...

Technologies that Can Help with GDPR Compliance

In just one month, the European Union's (EU) General Data Protection Regulation...

Five Last-Minute GDPR Readiness Tips

The European Union's tough new data privacy law, the General Data Protection Regulation (GDPR), goes into effect on May 25, 2018. It's...

How Pseudonymization Can Help You Comply with GDPR

Pseudonymization is one strategy that could help businesses struggling to comply with the...

How a Data Protection Impact Assessment Helps You Comply with GDPR

The European Union's General Data Protection Regulation, or GDPR for short, takes effect...

9 Top Secure Web Gateway Vendors

Secure web gateway solutions help keep enterprise networks from falling victim to malware...

AI’s Future in Cybersecurity

Artificial intelligence is already redefining cybersecurity, exposing sophisticated attacks and adding a...

How AI Is Redefining Cybersecurity

By practically every measure, cybersecurity threats are growing more numerous and sophisticated each passing day, a state of affairs that doesn't bode...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...