The latest security technology and best practices to secure cloud-based data, networks, applications, and systems.

  • Securing Home Employees with Enterprise-Class Solutions

    The number of employees working remotely skyrocketed during the COVID-19 pandemic, and many companies appear likely to continue with a hybrid work model when things return to normal. Remote work poses unique risks not addressed by traditional corporate network security, so it’s only natural that enterprise security vendors have been targeting work-at-home employees with more… Read more

  • AWS Unveils Cloud Security Competency Program for MSSPs

    Amazon Web Services has unveiled a revamped competency for managed security service providers (MSSPs) that is intended to make it simpler for end customers to identify AWS partners that have the most security services expertise. As IT organizations of all sizes continue to struggle with cloud security issues, many of them are looking to AWS… Read more

  • An Investment Firm Built Its Own SIEM. Here’s How.

    SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house… Read more

  • Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

    Cybercriminals using an IP address in China are trying to exploit a vulnerability disclosed earlier this month to deploy a variant of the Mirai malware on network routers affected by the vulnerability, according to researchers with Juniper Threat Labs. In a recent blog post, the researchers said the bad actors are looking to leverage a… Read more

  • NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

    Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source tool against attacks. In a 52-page report released this week, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) noted the advantages to… Read more

  • IoT Devices a Huge Risk to Enterprises

    When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away. According… Read more

  • Managed SIEM: A Faster Way to Great Security

    Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security services provider (MSSP) is an attractive solution. Managed Security Information and Event Management (SIEM) systems are a good way to accomplish that.… Read more

  • The IoT Cybersecurity Act of 2020: Implications for Devices

    A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an estimated 9.9 billion Internet of Things (IoT) devices. By 2025, we expect 21.5 billion. As more information about IoT device… Read more

  • How to Defend Common IT Security Vulnerabilities

    IT security pros have never faced more threats, whether it’s from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While there will always be new holes to plug, security vulnerabilities usually stem from the same few causes: unpatched vulnerabilities, misconfigurations or user error, and even… Read more

  • Cloud-based security: SECaaS

    Irrespective of your organization’s size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization. To… Read more

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis