dcsimg

Network Security - Article Archives - Page 5

How to Comply with GDPR

April 11, 2018 |

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant new data privacy law in years.

READ MORE

2018 RSA Conference Preview: An Insider's Guide to What's Hot

April 04, 2018 |

Wondering what to see at the 2018 RSA Conference 2018? Our preview of the world's largest cybersecurity conference will help.

READ MORE

Top 10 Distributed Denial of Service (DDoS) Protection Vendors

April 03, 2018 |

Distributed denial of service (DDoS) attacks can cripple an organization. Vendors have responded with an array of security solutions to mitigate such threats.

READ MORE

AlienVault vs Splunk: Top SIEM Solutions Compared

April 03, 2018 |

A look at the strengths and weaknesses of AlienVault and Splunk, two leading SIEM solutions.

READ MORE

Five Last-Minute GDPR Readiness Tips

March 29, 2018 |

Time for complying with GDPR is quickly running out. Experts from Equinix and Qualys shine a spotlight on five critical aspects of ensuring GDPR compliance.

READ MORE

Secdo AI-Powered Incident Response Redefines Battle Against Malware

March 28, 2018 |

We review Secdo's incident response platform that combines endpoint protection with cloud-based AI to handle threats in real time.

READ MORE

How Pseudonymization Can Help You Comply with GDPR

March 28, 2018 |

A look at pseudonymization and how the data-masking technique can help enterprises comply with the EU's tough new data privacy law.

READ MORE

10 Vendors Set to Innovate at the 2018 RSA Conference

March 26, 2018 |

Hundreds of vendors exhibit at the annual cyber security gathering, but only 10 are finalists in the 2018 Innovation sandbox contest. Find out who they are.

READ MORE

Types of Firewalls: What IT Security Pros Need to Know

March 21, 2018 |

Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.

READ MORE

LogRhythm vs Splunk: Top SIEM Solutions Compared

March 20, 2018 |

A look at the strengths and weaknesses of LogRhythm and Splunk, two market-leading SIEM systems.

READ MORE

ArcSight vs Splunk: Top SIEM Solutions Compared

March 05, 2018 |

We compare ArcSight and Splunk, two top SIEM solutions rated highly by users and analysts.

READ MORE

How to Defend Servers Against Cryptojacking

February 28, 2018 |

Learn how to take proactive steps to help mitigate the risk of becoming an unwitting accomplice to cryptojacking attack.

READ MORE

20 Cyber Security Startups to Watch in 2018

February 26, 2018 |

Here are 20 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.

READ MORE

How a Data Protection Impact Assessment Helps You Comply with GDPR

February 23, 2018 |

Why the data protection impact assessment provision is key to GDPR compliance and how businesses can conduct one.

READ MORE

ArcSight vs IBM QRadar: Top SIEM Solutions Compared

February 21, 2018 |

A look at the strengths and weaknesses of ArcSight and IBM QRadar, two leading SIEM solutions.

READ MORE

9 Top Intrusion Detection and Prevention Systems

February 20, 2018 |

Intrusion detection and prevention systems spot hackers as they attempt to breach a network. We review 9 of the top IDPS appliances to help you choose.

READ MORE

9 Top Secure Web Gateway Vendors

February 15, 2018 |

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

READ MORE

IBM QRadar vs Splunk: Top SIEM Solutions Compared

February 09, 2018 |

While both SIEM solutions are popular industry leaders, each has its strengths and weaknesses. We take a close look at both.

READ MORE

AI's Future in Cybersecurity

February 07, 2018 |

Industry experts discuss how AI is shaping the future of IT security.

READ MORE

What is Cryptojacking and Why Is It a Cybersecurity Risk?

February 06, 2018 |

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

READ MORE