Networks

How to Decrypt Ransomware Files – And What to Do When That Fails

For any organization struck by ransomware, business leaders always ask “how do we decrypt the data ASAP, so we can get back in business?” The good news is that ransomware files can be decrypted. T...

Complete Guide to the Types of DDoS Attacks

Distributed denial-of-service (DDoS) attacks occur when attackers use a large number of devices to attempt to overwhelm a resource and deny access to that resource for legitimate use. Most commonly, w...

Best Intrusion Detection and Prevention Systems (IDPS) for 2022

Intrusion detection systems (IDS) and intrusion prevention systems (IPS) – often combined as intrusion detection and prevention (IDPS) – have long been a key part of network security defenses for dete...

How You Get Malware: 8 Ways Malware Creeps Onto Your Device

Malicious programs or malware are common and dangerous threats in the digital space for both individual users and organizations alike. German IT-Security Institute AV-TEST has recorded over 1 billion ...

Businesses Secretly Pentest Partners as Supply Chain Fears Grow

Cybercriminals learn quickly. In a couple of decades' time, they've gone from pretending to be Nigerian princes to compromising the entire software supply chain, and every day brings news of a new at...

Security Data Lakes Emerge to Address SIEM Limitations

Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and ex...

Top Network Detection & Response (NDR) Solutions

In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas ol...

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

From mass production of cheap malware to ransomware as a service (RaaS), cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advan...

Security Compliance & Data Privacy Regulations

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have...

How to Secure DNS

The domain name system (DNS) is basically a directory of addresses for the internet. Your browser uses DNS to find the IP for a specific service. For example, when you enter esecurityplanet.com, the ...

Latest articles