Networks

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

From mass production of cheap malware to ransomware as a service (RaaS), cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advan...

Security Compliance & Data Privacy Regulations

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have...

How to Secure DNS

The domain name system (DNS) is basically a directory of addresses for the internet. Your browser uses DNS to find the IP for a specific service. For example, when you enter esecurityplanet.com, the ...

NordLayer Review: A VPN for the Zero Trust Era

Many companies use Virtual Public Networks (VPNs) to connect between their remote resources and their local networks. However, many of these VPN solutions have three significant issues. First, VPN...

15 Top Cybersecurity Certifications for 2022

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training a...

Best Rootkit Scanners for 2022

A rootkit is a dangerous and stealthy malware type that enables hackers to access your computer or other software without your knowledge. Organizations employ rootkit scanners to detect and remove ro...

Getting Started With the Metasploit Framework: A Pentesting Tutorial

The Metasploit project contains some of the best security tools available, including the open source Metasploit Framework. Both pen testers and hackers use it to find and exploit vulnerabilities as ...

Testing & Evaluating SIEM Systems: A Review of Rapid7 InsightIDR

As companies continue to get breached by the hour, IT and security teams are constantly scrambling their defenses in hopes of eradicating attackers from their networks. The (sort of) good news is th...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

How to Improve SD-WAN Security

As the modern workforce becomes increasingly mobile and enterprises branch out and grow, software-defined wide area networks (SD-WAN) have become a popular choice in the evolution of networking. ...

Latest articles