dcsimg

News - Article Archives - Page 1

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 06, 2018 |

Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.

READ MORE

IT Security Lessons from the Marriott Data Breach

December 04, 2018 |

500 million people are at risk because of a data breach at Marriott's Starwood hotel chain. What steps can your organization take to limit the risk of suffering the same fate?

READ MORE

IT Security Vulnerability Roundup – November 2018

November 30, 2018 |

A look at a dozen leading security flaws reported within the past 30 days.

READ MORE

CrowdStrike vs Symantec: Top EDR Solutions Compared

November 30, 2018 |

A look at the strengths and weaknesses of leading endpoint detection and response (EDR) solutions from CrowdStrike and Symantec.

READ MORE

Cybersecurity Threats Keep Evolving, Research Shows

November 29, 2018 |

We examine 11 important cybersecurity research reports released in November -- and the controls organizations should consider.

READ MORE

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018 |

Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.

READ MORE

8 Top Cyber Insurance Vendors

November 09, 2018 |

Cyber insurance is one more way to manage cybersecurity risk. Here are the top cyber insurance vendors that can help.

READ MORE

What 9 Cybersecurity Research Reports Say About the State of Risk

November 01, 2018 |

In October, cybersecurity vendors released a number of research reports highlighting the biggest risks in the threat landscape. 

READ MORE

IT Security Vulnerability Roundup – October 2018

October 30, 2018 |

A look at 10 of the many security flaws reported in the past month.

READ MORE

Think Like a Hacker: An Offensive Approach to Enterprise Security

October 15, 2018 |

Find out how the CISO of an infamously breached website uses an Offensive Risk Management approach to improve the security of his organization.

READ MORE

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

October 08, 2018 |

This new IT security testing technology continually monitors networks and systems to help organizations determine how secure their environment is.

READ MORE

Endpoint Security: It's Way More Complicated than You Think

October 04, 2018 |

It takes a number of different security technologies to enable a complete endpoint security stack.

READ MORE

IT Security Vulnerability Roundup – September 2018

September 29, 2018 |

A look at 12 of the many vulnerabilities disclosed over the past month.

READ MORE

Cybersecurity Research Shows Risks Continue to Rise

September 27, 2018 |

Vendors and industry associations put out a steady stream of research reports. What do 10 recent reports say about the state of IT security?

READ MORE

The IT Security Mistakes that Led to the Equifax Breach

September 17, 2018 |

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made that IT security teams should learn from.

READ MORE

Application Security: How to Secure the Many Apps in Your Enterprise

September 12, 2018 |

These measures can help organizations find and fix security vulnerabilities in applications, whether the apps come from third parties or are developed in-house.

READ MORE

Protecting Against the 7 Vulnerabilities of Meltdown and Spectre

September 10, 2018 |

The biggest security vulnerabilities of 2018 are the Meltdown and Spectre flaws. What are they and what should you do to keep your organization safe?

READ MORE

5 Tips for Managing Privileged Access

September 06, 2018 |

Some accounts are more valuable than others. Privileged access management (PAM) can help secure them.

READ MORE

IT Security Vulnerability Roundup – August 2018

August 29, 2018 |

A look at 10 leading vulnerabilities disclosed in the past month.

READ MORE