dcsimg

Network Security - Article Archives - Page 2

The IT Security Mistakes that Led to the Equifax Breach

September 17, 2018 |

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made that IT security teams should learn from.

READ MORE

8 Ways Security Automation and Orchestration Is Transforming Security Operations

September 05, 2018 |

Enterprises are turning to SOAR solutions to streamline response to cybersecurity incidents.

READ MORE

Ten Top Next-Generation Firewall (NGFW) Vendors

August 16, 2018 |

Next-generation firewalls are essential to IT security. We review ten of the best.

READ MORE

10 Top Unified Threat Management Vendors

July 23, 2018 |

UTM appliances offer a quick path to comprehensive security for SMBs, but features differ among vendors. Here's a comprehensive look at top UTM solutions.

READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018 |

A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.

READ MORE

Where To Invest Your Cybersecurity Budget

July 03, 2018 |

VIDEO: Tom Parker, Managing Director of Accenture Security, discusses how organizations should be budgeting their cybersecurity dollars - and making the most of what they already have.

READ MORE

Sophos XG vs Fortinet FortiGate: Top NGFWs Compared

June 29, 2018 |

A look at the strengths and weaknesses of top next-generation firewall solutions from Sophos and Fortinet.

READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018 |

A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.

READ MORE

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

June 26, 2018 |

Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.

READ MORE

Sophos XG vs SonicWall NSA: Top NGFWs Compared

June 18, 2018 |

A look at the strengths and weaknesses of Sophos XG and SonicWall NSA, two top next-generation firewalls.

READ MORE

Container and Kubernetes Security: It's Complicated

June 13, 2018 |

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

READ MORE

10 Security Projects CISOs Should Consider: Gartner Analyst

June 12, 2018 |

And 10 they should have already done.

READ MORE

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

June 06, 2018 |

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.

READ MORE

An Inside Look at OpenStack Security Efforts

June 01, 2018 |

OpenStack is a widely deployed open-source cloud platform, but isn't necessarily secure by default. Learn what leading OpenStack experts said is needed to help make your cloud secure.

READ MORE

GDPR Solutions: Cybersecurity Vendors Offer New Compliance Products

June 01, 2018 |

GDPR is here, and cybersecurity vendors are responding with privacy and security compliance solutions.

READ MORE

How to Secure Edge Computing

May 29, 2018 |

As cloud computing moves to the edge of network, organizations will face new security challenges.

READ MORE

How to Stop Advanced Persistent Threats

May 22, 2018 |

A security professional's guide to advanced persistent threats and how to stop and prevent them.

READ MORE

11 Top Managed Security Service Providers (MSSPs)

May 17, 2018 |

Our guide to the top managed security service providers (MSSPs), based on their ratings in analyst reports the Gartner Magic Quadrant and the IDC MarketScape Vendor Assessment.

READ MORE

Where Does SIEM Fit in an Enterprise?

May 16, 2018 |

VIDEO: Fortinet CISO Philip Quade details his firm's strategic approach and explains SIEM's core security role.

READ MORE

Key Steps for Optimizing POS Security

May 09, 2018 |

It's not just about PCI DSS compliance – here are the three most important factors in a POS security solution, plus other things you can do to avoid credit card breaches.

READ MORE