Cloud

Managed SIEM: A Faster Way to Great Security

Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some...

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

Cloud-based security: SECaaS

Irrespective of your organization's size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail...

Cloud Bucket Vulnerability Management in 2021

The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff....

Firewalls as a Service (FWaaS): The Future of Network Firewalls?

Does your organization still have a physical appliance for a firewall? You might be able to count the days before that black box is...

Top CASB Security Vendors for 2021

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity. After carefully surveying the...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list...

Top Cloud Security Companies & Tools

  Cloud computing has become ubiquitous because of its agility and cost savings — but along with those benefits have come security concerns. Because cloud...

Cloud Security Requires Visibility, Access Control: Security Research

Cloud computing has been one of the most ubiquitous trends in modern IT, bringing...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...