Sean Michael Kerner

Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.
612 Posts

Top Full Disk Encryption Software Products

Data in the clear is no small security risk for organizations of all...

Best Cybersecurity Awareness Training

The best security posture in the world will get you only so far, because the reality is that one employee clicking on a bad...

20 Vendors Making News at RSA Conference 2021

The annual RSA Security Conference is one of the largest gatherings of the...

Top Data Loss Prevention (DLP) Solutions

Data loss prevention (DLP) technology is becoming a critically important IT security tool...

Top Cloud Security Companies & Tools

Cloud computing has become ubiquitous because of its agility and cost savings — but...

Edge Security: How to Secure the Edge of the Network

Edge computing is a term that is becoming increasingly popular not just as a buzzword but as...

Application Security Vendor List for 2021

There are few aspects of modern IT security that are as critical as application...

Cloud Security Requires Visibility, Access Control: Security Research

Cloud computing has been one of the most ubiquitous trends in modern IT, bringing...

Email Still a Major Attack Vector: Security Research

While modern cyber threats can take different forms and delivery methods, email continues to be one of the primary approaches cyber attackers...

From Insiders to Endpoints, Security Risks Remain High: Research

From insiders to endpoints and the cloud, organizations find themselves defending against cybersecurity threats everywhere they look, and new threats are emerging...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...