Sean Michael Kerner Avatar
  • Aqua Security: Container Security Product Overview and Analysis

      See our complete list of top container and Kubernetes security vendors Aqua Security: Company Description Aqua Security is a pioneer in the container security space and was founded in 2015 by a team of IT security veterans from companies such as Intel Security/McAfee, CA Technologies, and Imperva. Today it offers a mature and scalable […]

  • Alert Logic: Container Security Product Overview and Analysis

    See our complete list of top container and Kubernetes security vendors Company Description Founded in 2002, Alert Logic is a privately held company headquartered in Houston, Texas, with offices in Austin, Seattle, Dallas, Cardiff, Belfast, London and Cali, Colombia. Alert Logic provides security-as-a-service (SaaS) technologies that combine cloud-based software and analytics with services to assess, […]

  • Qualys Container Security: Product Overview and Analysis

    See our complete list of top container and Kubernetes security vendors Company Description Founded in 1999, Qualys is headquartered in Foster City, CA, and led by chairman and CEO Philippe Courtot. Qualys became publicly traded on Nasdaq with the symbol QLYS on September 28, 2012. Its initial cloud-based product was QualysGuard in December 2000, which […]

  • How Military Tactics Apply to Cybersecurity

    The modern cybersecurity landscape has often been compared to a battlefield, with adversaries and defenders alike using military-style strategy and tactics. With nation-states increasingly engaged in cyber attacks, the military analogy isn’t just a metaphor, it’s becoming a reality for how cybersecurity actually works. Among the most well known institutions in the U.S. for studying […]

  • IT Security Lessons from the Marriott Data Breach

    A number of data breaches have been disclosed over the course of 2018, but none have been as big or had as much impact as the one disclosed on Nov. 30 by hotel chain Marriott International. A staggering 500 million people are at risk as a result of the breach, placing it among the largest […]

  • How to Improve Governance, Risk and Compliance

    The daily challenge for many IT leaders is figuring out how to deal with a constant barrage of security risks and an ever-growing?regulatory compliance landscape. It’s a challenge Alissa Johnson has dealt with throughout her career. Johnson is currently the Chief Information Security Officer (CISO) at Xerox, a post she has held since October 2016. […]

  • Endpoint Security: It’s Way More Complicated than You Think

    The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition is all about defending endpoints, as opposed to say networks, there are many levels of nuance and technologies involved in endpoint security. In a session […]

  • The IT Security Mistakes that Led to the Equifax Breach

      The Equifax data breach that exposed the sensitive personal information of more than 145 million consumers was one of the worst data breaches of recent years, both for the amount of information exposed and the ease with which hackers moved about the company’s systems. The breach was publicly disclosed on Sept. 7, 2017, and details […]

  • Spectre and Meltdown Vulnerabilities & Protection

    While there is no shortage of data breaches and new exploits in any given year, it’s relatively rare for there to be an entirely new class of vulnerabilities to be publicly disclosed, but that’s what has happened this year with Spectre and Meltdown. The Spectre and Meltdown flaws were publicly disclosed on Jan. 3, ushering in […]

  • Privileged Access Management Best Practices

    Access to applications, servers and network resources is the cornerstone of enterprise IT, which is all about enabling connectivity. Not every account should have full access to everything in an enterprise, however, which is where super user or privileged accounts come into play. With a privileged account, a user has administrative access to enterprise resources, […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis