Networks

How You Get Malware: 8 Ways Malware Creeps Onto Your Device

Malicious programs or malware are common and dangerous threats in the digital space for both individual users and organizations alike. German IT-Security Institute AV-TEST has recorded over 1 billion ...

Businesses Secretly Pentest Partners as Supply Chain Fears Grow

Cybercriminals learn quickly. In a couple of decades' time, they've gone from pretending to be Nigerian princes to compromising the entire software supply chain, and every day brings news of a new at...

Security Data Lakes Emerge to Address SIEM Limitations

Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and ex...

How to Stop DDoS Attacks: Prevention & Response

Distributed denial-of-service (DDoS) attacks cause problems for organizations of all sizes. To fight DDoS attacks, organizations and teams need to implement the three standard phases for any IT threat...

Top Network Detection & Response (NDR) Solutions

In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas ol...

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

From mass production of cheap malware to ransomware as a service (RaaS), cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advan...

Security Compliance & Data Privacy Regulations

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have...

How to Secure DNS

The domain name system (DNS) is basically a directory of addresses for the internet. Your browser uses DNS to find the IP for a specific service. For example, when you enter esecurityplanet.com, the ...

NordLayer Review: A VPN for the Zero Trust Era

Many companies use Virtual Public Networks (VPNs) to connect between their remote resources and their local networks. However, many of these VPN solutions have three significant issues. First, VPN...

15 Top Cybersecurity Certifications for 2022

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training a...

Latest articles