Best Products
Cybersecurity Companies
Vulnerability Management
EDR
NGFW
IAM
CASB
Intrusion Detection and Prevention
Threat Intelligence
SIEM
Network Access Control
UEBA
Governance, Risk & Compliance
Web Application Firewall
Networks
What is Network Security?
How to Secure a Network
Network Security Threats
Network Security Tools
Cloud
Threats
Trends
Endpoint
Applications
Compliance
Search
Facebook
Linkedin
Twitter
Search
Best Products
Cybersecurity Companies
Vulnerability Management
EDR
NGFW
IAM
CASB
Intrusion Detection and Prevention
Threat Intelligence
SIEM
Network Access Control
UEBA
Governance, Risk & Compliance
Web Application Firewall
Networks
What is Network Security?
How to Secure a Network
Network Security Threats
Network Security Tools
Cloud
Threats
Trends
Endpoint
Applications
Compliance
More
Zephin Livingston
Zephin Livingston is a content writer for eSecurityPlanet with years of experience in multiple fields including cybersecurity, tech, cultural criticism, and media literacy. They're currently based out of Seattle.
9 Posts
Top 6 Rootkit Threats and How to Protect Yourself
Networks
December 1, 2022
How You Get Malware: 8 Ways Malware Creeps Onto Your Device
Networks
December 1, 2022
Main Targets of Ransomware Attacks & What They Look For
Threats
December 1, 2022
What is Malware? Definition, Purpose & Common Protections
Threats
November 29, 2022
The History of Computer Viruses & Malware
Threats
November 2, 2022
What is Employee Monitoring? Full Guide to Getting It Right
Trends
October 21, 2022
Behavioral Analytics in Cybersecurity: Does It Work as Advertised?
Applications
October 11, 2022
Best Fraud Management Systems & Detection Tools
Products
September 15, 2022
The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data
Trends
September 13, 2022
Search
Latest articles
How to Improve Email Secu...
June 8, 2023
AI Will Save Security ...
June 7, 2023
Security Buyers Are Conso...
June 7, 2023
5 Ways to Configure a SIE...
June 6, 2023