dcsimg

News - Article Archives - Page 2

9 Top Database Security Tools

February 27, 2019 |

Databases contain some of the most critical data in an organization. Here are 9 top database security tools to help you protect that data.

READ MORE

What is a Secure Web Gateway - And What Can One Do for You?

February 13, 2019 |

We define secure web gateway, including how web gateways compare to other security tools such as firewalls and CASBs, and where this important IT security market is headed.

READ MORE

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

February 08, 2019 |

Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance.

READ MORE

A third of companies are largely unprepared for cybersecurity attacks: eSecurity Planet Survey

February 07, 2019 |

A surprising number of organizations are not taking necessary steps to reduce cyber risk.

READ MORE

Over Half of Companies Are Upping Spending on IT Security: eSecurity Planet Survey

February 06, 2019 |

Data breaches and new privacy regulations are prompting increased spending on IT security products and staff.

READ MORE

New eSecurityPlanet.com Survey Shows Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

February 06, 2019 |

Press release: Highly publicized data breaches, increasing vulnerabilities, and new privacy regulations globally are pushing companies to increase spending on trusted IT security tools, staff, and hiring.

READ MORE

Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows

February 05, 2019 |

Enterprises understand the urgent need for stronger cybersecurity measures — even if they're slow to adopt them, research shows.

READ MORE

IT Security Vulnerability Roundup – January 2019

February 01, 2019 |

We take a closer look at 12 critical security flaws disclosed within the past few weeks.

READ MORE

9 Top Web Application Firewall (WAF) Vendors

January 25, 2019 |

We review nine of the top web application firewall (WAF) products to help you protect web-facing applications.

READ MORE

7 Tips for Container and Kubernetes Security

January 10, 2019 |

Simply deploying containers with a managed service isn't enough. Container security pros offer their tips to keep Kubernetes deployments safe and secure.

READ MORE

IT Security Vulnerability Roundup – December 2018

December 31, 2018 |

We look at 10 significant security flaws disclosed within the past 30 days.

READ MORE

10 Top Container and Kubernetes Security Vendors

December 26, 2018 |

Containers can get applications running quickly, but that convenience comes with a number of security concerns. Here are the container security vendors that can help.

READ MORE

Cybersecurity Research Reveals IoT Vulnerabilities, Nation-State Threats

December 21, 2018 |

We examine 7 cybersecurity research reports released in November -- and the controls organizations should consider.

READ MORE

How Military Tactics Apply to Cybersecurity

December 18, 2018 |

VIDEO: Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that.

READ MORE

2019 IT Security Outlook: New Attack Vectors Will Emerge

December 06, 2018 |

Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.

READ MORE

IT Security Lessons from the Marriott Data Breach

December 04, 2018 |

500 million people are at risk because of a data breach at Marriott's Starwood hotel chain. What steps can your organization take to limit the risk of suffering the same fate?

READ MORE

IT Security Vulnerability Roundup – November 2018

November 30, 2018 |

A look at a dozen leading security flaws reported within the past 30 days.

READ MORE

CrowdStrike vs Symantec: Top EDR Solutions Compared

November 30, 2018 |

A look at the strengths and weaknesses of leading endpoint detection and response (EDR) solutions from CrowdStrike and Symantec.

READ MORE

Cybersecurity Threats Keep Evolving, Research Shows

November 29, 2018 |

We examine 11 important cybersecurity research reports released in November -- and the controls organizations should consider.

READ MORE

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE