Networks

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information...

How to Implement Zero Trust

Zero trust has gone from new idea to buzzword and industry paradigm in a decade. Much more than a one size fits all product...

How to Implement Microsegmentation

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the...

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

Managed SIEM: A Faster Way to Great Security

Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some...

Best Vulnerability Scanning Tools for 2021

Vulnerability scanning, assessment and management all share a fundamental cybersecurity principle: the bad guys can't get in if they don't have a way. To...

Top 22 Cybersecurity Startups to Watch in 2021

Cybersecurity products, services and professionals have never been in higher demand. In fact, there remains a huge shortage of experienced security professionals available to...

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Best Practices to Make Sure VPN Access Remains Seamless

The COVID-19 pandemic of 2020 has forced enterprises of all sizes and industries to adopt new work approaches that keep employees safe at home...

SASE: Securing the Network Edge

Dramatic growth in Internet of Things (IoT) devices and external users have forced IT departments to move storage and processing functions closer to the...

Latest articles