The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…
There has never been a better time to have a career in IT security. That’s because the demand for IT security people of all skill levels continues to skyrocket and, what’s more, it shows no sign of coming back down to more moderate levels. With IT security threats showing no sign of abating and data…
At this week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Brian Reed outlined 10 cybersecurity projects that could help enterprises reduce security risk. Reed also noted enterprise spending priorities. CASB tops the list by a wide margin, with 46% compound annual growth (CAGR) expected through 2022, followed by encryption at 23.7% annual growth, threat…
Enterprises face an onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and suspicious behavior. Endpoint security, intrusion detection and prevention, security information and event management (SIEM), threat intelligence, and other security systems flood security teams with alerts and log entries. With the number and sophistication…
The RSA Conference is one of the biggest events of the year in the InfoSec industry, drawing vendors, experts, security practitioners and the curious from near and far. The theme for the 2019 event is “Better,” with the idea being that organizations, vendors and the cybersecurity industry as a whole can continue to do better.…
Driven by fear of data breaches and new privacy regulations, such as Europe’s General Data Protection Regulation (GDPR), large enterprises are spending aggressively on IT security measures, according to eSecurity Planet‘s newly released 2019 State of IT Security survey. The survey found that 54 percent of companies will increase their IT security spending this year,…
With a global cybersecurity staffing shortage of 3 million and growing, including a need for 500,000 IT security pros in North America alone, IT security jobs are going to be in plentiful supply again in 2019, and those with the right skills will be able to take their pick. The shortage of security talent isn’t…
User and entity behavior analytics (UEBA) is a valuable tool for detecting signs of malicious activity within your network. UEBA monitors the activities of users and entities (such as hardware devices and networks) and compares present activity to “normal” or “baseline” behavior. Using advanced statistical analysis and, in some cases, machine learning algorithms, the aim…
A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. See our picks for Top UTM vendors. UTM appliances provide an alternative approach to building a security solution from several different point products, often from different vendors. These point…
At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk. First, though, MacDonald listed 10 things enterprises should already be doing to “make sure you’ve got the basics right.” Those 10 basics are: Upgrade to…