dcsimg

Network Security - Article Archives - Page 1

How to Conduct a Vulnerability Assessment: 5 Steps toward Better Cybersecurity

April 17, 2019 |

A vulnerability assessment is a core requirement for IT security. We outline the benefits and steps for keeping your network and data safe from cybercriminals.

READ MORE

How to Manage a Security Operations Center

April 10, 2019 |

We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work.

READ MORE

Vulnerability Scanning: What It Is and How to Do It Right

April 05, 2019 |
READ MORE

DevSecOps: How to Build Security into Apps

March 13, 2019 |

We define DevSecOps, how it relates to DevOps, and how security can be built into the development process with minimal disruption.

READ MORE

Top 10 Takeaways from RSA Conference 2019

March 11, 2019 |

After five days of sessions, events and demos, here are some key cybersecurity themes that emerged at RSA Conference 2019.

READ MORE

10 Vendors Making Product Announcements at RSA Conference 2019

March 06, 2019 |

Here are 10 vendors with interesting product announcements at the 2019 RSA Conference, spanning email security, container security, threat detection, SIEM, EDR and cloud security.

READ MORE

Top 10 Sessions to Catch at RSA Conference 2019

March 04, 2019 |

Here are our picks for the top RSA conference sessions that could help you improve cybersecurity within your own organization.

READ MORE

2019 RSA Conference Preview: An Insider's Guide to What's Hot

March 02, 2019 |

Wondering what to see at the 2019 RSA Conference? Our preview of the world's largest cybersecurity conference will point you in the right direction.

READ MORE

10 Vendors Set to Innovate at RSA Conference 2019

March 01, 2019 |

Hundreds of vendors exhibit at the annual cyber security gathering, but only 10 are finalists in the 2019 Innovation sandbox contest. Find out who they are.

READ MORE

What is a Secure Web Gateway - And What Can One Do for You?

February 13, 2019 |

We define secure web gateway, including how web gateways compare to other security tools such as firewalls and CASBs, and where this important IT security market is headed.

READ MORE

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

February 08, 2019 |

Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance.

READ MORE

Over Half of Companies Are Upping Spending on IT Security: eSecurity Planet Survey

February 06, 2019 |

Data breaches and new privacy regulations are prompting increased spending on IT security products and staff.

READ MORE

9 Top Web Application Firewall (WAF) Vendors

January 25, 2019 |

We review nine of the top web application firewall (WAF) products to help you protect web-facing applications.

READ MORE

2019 IT Security Employment Outlook: The Hottest Skills and Markets

January 03, 2019 |

With a need for 3 million IT security pros, cybersecurity remains a hot market. Here are the skills most in demand and the best places to find a job.

READ MORE

11 Top Breach and Attack Simulation (BAS) Vendors

December 13, 2018 |

A look at the top vendors in the breach and attack simulation (BAS) market, a new IT security technology that promises continuous vulnerability assessment.

READ MORE

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 06, 2018 |

Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.

READ MORE

IT Security Lessons from the Marriott Data Breach

December 04, 2018 |

500 million people are at risk because of a data breach at Marriott's Starwood hotel chain. What steps can your organization take to limit the risk of suffering the same fate?

READ MORE

UEBA: Protecting Your Network When Other Security Systems Fail

November 20, 2018 |

User and entity behavior analytics (UEBA) can help organizations spot compromised applications and accounts, malicious insiders, and even APTs.

READ MORE

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE

Top 10 SIEM Products

November 06, 2018 |

We review and compare 10 SIEM products that can help you manage your overall IT security from a single tool.

READ MORE