Facebook
LinkedIn
Twitter
Search
Search
Best Products
Cybersecurity Companies
Vulnerability Management
EDR
NGFW
IAM
CASB
Intrusion Detection and Prevention
Threat Intelligence
SIEM
Network Access Control
UEBA
Governance, Risk & Compliance
Web Application Firewall
Networks
What is Network Security?
How to Secure a Network
Network Security Threats
Network Security Tools
Cloud
Threats
Trends
Endpoint
Applications
Compliance
Search
Search
Zephin Livingston
Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They’re currently based out of Seattle.
Top 6 Rootkit Threats and How to Protect Yourself
Networks
December 1, 2022
How You Get Malware: 8 Ways Malware Creeps Onto Your Device
Networks
December 1, 2022
Main Targets of Ransomware Attacks & What They Look For
Threats
December 1, 2022
What is Malware? Definition, Purpose & Common Protections
Threats
November 29, 2022
The History of Computer Viruses & Malware
Threats
November 2, 2022
What is Employee Monitoring? Full Guide to Getting It Right
Trends
October 21, 2022
Behavioral Analytics in Cybersecurity: Does It Work as Advertised?
Applications
October 11, 2022
Best Fraud Management Systems & Detection Tools
Products
September 15, 2022
The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data
Trends
September 13, 2022
Search
IT Security Resources
What Is Cloud Security? Everything You Need to Know
November 22, 2023
What Is Cloud Configuration Management? Complete Guide
November 22, 2023
6 Best Unified Threat Management (UTM) Devices & Software for 2023
November 22, 2023
What Is Lateral Movement? Detection & Prevention Tips
November 13, 2023
Top Cybersecurity Companies
Top 10 Cybersecurity Companies
1
Semperis
See full list
Get the Free Newsletter!
Subscribe to Cybersecurity Insider for top news, trends & analysis
Email Address
By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy.
Subscribe