dcsimg

Network Security - Article Archives - Page 2

How to Secure Edge Computing

May 29, 2018 |

As cloud computing moves to the edge of network, organizations will face new security challenges.

READ MORE

How to Stop Advanced Persistent Threats

May 22, 2018 |

A security professional's guide to advanced persistent threats and how to stop and prevent them.

READ MORE

11 Top Managed Security Service Providers (MSSPs)

May 17, 2018 |

Our guide to the top managed security service providers (MSSPs), based on their ratings in analyst reports the Gartner Magic Quadrant and the IDC MarketScape Vendor Assessment.

READ MORE

Where Does SIEM Fit in an Enterprise?

May 16, 2018 |

VIDEO: Fortinet CISO Philip Quade details his firm's strategic approach and explains SIEM's core security role.

READ MORE

Key Steps for Optimizing POS Security

May 09, 2018 |

It's not just about PCI DSS compliance – here are the three most important factors in a POS security solution, plus other things you can do to avoid credit card breaches.

READ MORE

What Is SQL Injection and How Can It Hurt You?

May 07, 2018 |

Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.

READ MORE

How to Prevent SQL Injection Attacks

May 02, 2018 |

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

READ MORE

Critical Security Configuration Issue Affects All SAP Implementations

April 27, 2018 |

The flaw is driven by a security configuration initially documented by SAP over a decade ago.

READ MORE

SolarWinds vs Splunk: Top SIEM Solutions Compared

April 26, 2018 |

An analysis of the strengths and weaknesses of SolarWinds and Splunk, two leading security information and event management (SIEM) solutions.

READ MORE

Technologies that Help Tame GDPR Compliance

April 24, 2018 |

IT solutions and vendors that can help businesses meet the EU's tough new data privacy regulation.

READ MORE

How F5 Networks' CISO Defends the Enterprise

April 23, 2018 |

VIDEO: Mike Convertino, CISO of F5 Networks, discusses the technology tools and human resources he uses to help secure his network and inform F5's product development.

READ MORE

Redefining Cybersecurity to Protect Next-Generation Digital Transformation

April 18, 2018 |

IDC coins the term AIRO - Analytics, Intelligence, Response and Orchestration - to define an emerging area of cybersecurity.

READ MORE

You Can Have Security or You Can Have Speed: RSA Cryptographers' Panel

April 17, 2018 |

The RSA Conference 2018 Cryptographers' panel was not particularly optimistic about blockchain or the state of modern cyber security. They also had much to say about Facebook, GDPR and elections hacking too.

READ MORE

10 Vendors Making Product Announcements at RSA Conference 2018

April 16, 2018 |

There are hundreds of vendors at the RSA Conference, many of them making news over the course of the week. Here are 10 vendors making major product announcements on day one.

READ MORE

The Top 10 Sessions to Catch at RSA Conference 2018

April 12, 2018 |

There are hundreds of ways to spend your time at the 2018 RSA Conference, but here are the 10 sessions that people will be talking about.

READ MORE

eSecurity Planet Guide to RSA Conference 2018

April 11, 2018 |

Learn everything you need to know from the largest cybersecurity conference in the world.

READ MORE

How to Comply with GDPR

April 11, 2018 |

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant new data privacy law in years.

READ MORE

2018 RSA Conference Preview: An Insider's Guide to What's Hot

April 04, 2018 |

Wondering what to see at the 2018 RSA Conference 2018? Our preview of the world's largest cybersecurity conference will help.

READ MORE

Top 10 Distributed Denial of Service (DDoS) Protection Vendors

April 03, 2018 |

Distributed denial of service (DDoS) attacks can cripple an organization. Vendors have responded with an array of security solutions to mitigate such threats.

READ MORE

AlienVault vs Splunk: Top SIEM Solutions Compared

April 03, 2018 |

A look at the strengths and weaknesses of AlienVault and Splunk, two leading SIEM solutions.

READ MORE