dcsimg

Network Security - Article Archives - Page 4

What Is SQL Injection and How Can It Hurt You?

May 07, 2018 |

Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.

READ MORE

How to Prevent SQL Injection Attacks

May 02, 2018 |

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

READ MORE

Critical Security Configuration Issue Affects All SAP Implementations

April 27, 2018 |

The flaw is driven by a security configuration initially documented by SAP over a decade ago.

READ MORE

SolarWinds vs Splunk: Top SIEM Solutions Compared

April 26, 2018 |

An analysis of the strengths and weaknesses of SolarWinds and Splunk, two leading security information and event management (SIEM) solutions.

READ MORE

Technologies that Help Tame GDPR Compliance

April 24, 2018 |

IT solutions and vendors that can help businesses meet the EU's tough new data privacy regulation.

READ MORE

How F5 Networks' CISO Defends the Enterprise

April 23, 2018 |

VIDEO: Mike Convertino, CISO of F5 Networks, discusses the technology tools and human resources he uses to help secure his network and inform F5's product development.

READ MORE

Redefining Cybersecurity to Protect Next-Generation Digital Transformation

April 18, 2018 |

IDC coins the term AIRO - Analytics, Intelligence, Response and Orchestration - to define an emerging area of cybersecurity.

READ MORE

You Can Have Security or You Can Have Speed: RSA Cryptographers' Panel

April 17, 2018 |

The RSA Conference 2018 Cryptographers' panel was not particularly optimistic about blockchain or the state of modern cyber security. They also had much to say about Facebook, GDPR and elections hacking too.

READ MORE

10 Vendors Making Product Announcements at RSA Conference 2018

April 16, 2018 |

There are hundreds of vendors at the RSA Conference, many of them making news over the course of the week. Here are 10 vendors making major product announcements on day one.

READ MORE

The Top 10 Sessions to Catch at RSA Conference 2018

April 12, 2018 |

There are hundreds of ways to spend your time at the 2018 RSA Conference, but here are the 10 sessions that people will be talking about.

READ MORE

eSecurity Planet Guide to RSA Conference 2018

April 11, 2018 |

Learn everything you need to know from the largest cybersecurity conference in the world.

READ MORE

How to Comply with GDPR

April 11, 2018 |

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant new data privacy law in years.

READ MORE

2018 RSA Conference Preview: An Insider's Guide to What's Hot

April 04, 2018 |

Wondering what to see at the 2018 RSA Conference 2018? Our preview of the world's largest cybersecurity conference will help.

READ MORE

Top 10 Distributed Denial of Service (DDoS) Protection Vendors

April 03, 2018 |

Distributed denial of service (DDoS) attacks can cripple an organization. Vendors have responded with an array of security solutions to mitigate such threats.

READ MORE

AlienVault vs Splunk: Top SIEM Solutions Compared

April 03, 2018 |

A look at the strengths and weaknesses of AlienVault and Splunk, two leading SIEM solutions.

READ MORE

Five Last-Minute GDPR Readiness Tips

March 29, 2018 |

Time for complying with GDPR is quickly running out. Experts from Equinix and Qualys shine a spotlight on five critical aspects of ensuring GDPR compliance.

READ MORE

Secdo AI-Powered Incident Response Redefines Battle Against Malware

March 28, 2018 |

We review Secdo's incident response platform that combines endpoint protection with cloud-based AI to handle threats in real time.

READ MORE

How Pseudonymization Can Help You Comply with GDPR

March 28, 2018 |

A look at pseudonymization and how the data-masking technique can help enterprises comply with the EU's tough new data privacy law.

READ MORE

10 Vendors Set to Innovate at the 2018 RSA Conference

March 26, 2018 |

Hundreds of vendors exhibit at the annual cyber security gathering, but only 10 are finalists in the 2018 Innovation sandbox contest. Find out who they are.

READ MORE

Types of Firewalls: What IT Security Pros Need to Know

March 21, 2018 |

Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.

READ MORE