Networks

Apple White Hat Hack Shows Value of Pen Testers

    The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of...

How to Improve SD-WAN Security

As the modern workforce becomes increasingly mobile and enterprises branch out as they grow their organization, Software-Defined Wide Area Networks (SD-WAN) have become a...

Cybersecurity Jobs & Salaries: Outlook 2020

There has never been a better time to have a career in IT...

Edge Security: How to Secure the Edge of the Network

Edge computing is a term that is becoming increasingly popular not just as a buzzword but as...

IT Security Outlook 2020: The Security Arms Race Escalates

There's a reason IT security spending has soared by 3,500% in the last 15 years: The bad guys want your data and intellectual property,...

Security Compliance & Data Privacy Regulations

Regulatory compliance and data privacy issues have long been an IT security nightmare – and the EU's General Data Protection Regulation (GDPR), which took...

Gartner’s Top IT Security Projects for 2021

  At this week's Gartner Security Summit in National Harbor, Maryland, Gartner analyst Brian Reed outlined 10 cybersecurity projects that could help enterprises reduce security risk. Reed also...

How to Conduct a Vulnerability Assessment: 5 Steps toward Better Cybersecurity

In today's threat environment, it's not just a good idea to conduct a cybersecurity vulnerability assessment, and to do so on a...

Security Operations Center Best Practices

Enterprises face an onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and suspicious behavior....

Vulnerability Scanning: What It Is and How to Do It Right

Vulnerability management is a key responsibility of any IT security team or managed security service provider, and it involves assessing, mitigating (if necessary) and...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...