Trends
Best Products
Cybersecurity Companies
EDR
NGFW
IAM
CASB
Intrusion Detection and Prevention
Threat Intelligence
SIEM
Network Access Control
UEBA
Risk Management
Governance, Risk & Compliance
Web Application Firewall
Networks
Threats
Endpoint
Applications
Mobile
Cloud
Compliance
Search
Facebook
Linkedin
Twitter
Search
Trends
Best Products
Cybersecurity Companies
EDR
NGFW
IAM
CASB
Intrusion Detection and Prevention
Threat Intelligence
SIEM
Network Access Control
UEBA
Risk Management
Governance, Risk & Compliance
Web Application Firewall
Networks
Threats
Endpoint
Applications
Mobile
Cloud
Compliance
More
Zephin Livingston
Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.
9 Posts
Top 6 Rootkit Threats and How to Protect Yourself
Networks
December 1, 2022
Main Targets of Ransomware Attacks & What They Look For
Threats
December 1, 2022
How You Get Malware: 8 Ways Malware Creeps Onto Your Device
Networks
December 1, 2022
What is Malware? Definition, Purpose & Common Protections
Threats
November 29, 2022
The History of Computer Viruses & Malware
Threats
November 2, 2022
What is Employee Monitoring? Full Guide to Getting It Right
Trends
October 21, 2022
Behavioral Analytics in Cybersecurity: Does It Work as Advertised?
Applications
October 11, 2022
Best Fraud Management Systems & Detection Tools
Products
September 15, 2022
The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data
Trends
September 13, 2022
Search
Latest articles
Hackers Use RMM Software ...
January 27, 2023
Threat Groups Distributin...
January 26, 2023
10 Best Identity and Acce...
January 26, 2023
How to Prevent Cross-Site...
January 25, 2023