dcsimg

News - Article Archives - Page 2

Lessons Learned at DEF CON 26

August 17, 2018 |

Some key security lessons from the world's largest hacker conference.

READ MORE

10 Vendors Making News at Black Hat USA 2018

August 09, 2018 |

New security products unveiled at the Black Hat USA 2018 conference include EDR, cloud security, IoT security, DevSecOps tools and more.

READ MORE

How Blackberry Does Secure Release Management

August 09, 2018 |

In a Black Hat USA session, BlackBerry's Product Security Operations Team director explained how organizations can improve their software release process to reduce vulnerabilities.

READ MORE

Demisto Demonstrates Tool to Validate IOC Detection at Black Hat

August 08, 2018 |

Does your EDR effectively detect the indicators of compromise it is given? That's the goal of a new project set to be released at Black Hat USA 2018.

READ MORE

Top 10 Talks to See at Black Hat USA 2018

August 06, 2018 |

Security researchers, vendors and IT pros are headed for Las Vegas for Black Hat USA 2018. Here are 10 talks that shouldn't be missed.

READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018 |

A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.

READ MORE

With So Many Eyeballs, Is Open Source Security Better?

July 10, 2018 |

VIDEO: Dirk Hohndel, VP and Chief Open-Source Officer at VMware, talks about how dev security should  be done, whether the code is open source or proprietary.

READ MORE

Designing Employee Security Awareness Training That Works

July 06, 2018 |

The secret to effective employee security awareness training boils down to three things: Train early, often, and explain why.

READ MORE

Where To Invest Your Cybersecurity Budget

July 03, 2018 |

VIDEO: Tom Parker, Managing Director of Accenture Security, discusses how organizations should be budgeting their cybersecurity dollars - and making the most of what they already have.

READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018 |

A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.

READ MORE

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

June 26, 2018 |

Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.

READ MORE

What Metrics Should Enterprises Focus On to Improve Cybersecurity?

June 25, 2018 |

VIDEO: Dmitri Alperovitch, co-founder and CTO of CrowdStrike, discusses why simply focusing on malware prevention isn't enough for modern cybersecurity.

READ MORE

Container and Kubernetes Security: It's Complicated

June 13, 2018 |

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

READ MORE

10 Security Projects CISOs Should Consider: Gartner Analyst

June 12, 2018 |

And 10 they should have already done.

READ MORE

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

June 06, 2018 |

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.

READ MORE

An Inside Look at OpenStack Security Efforts

June 01, 2018 |

OpenStack is a widely deployed open-source cloud platform, but isn't necessarily secure by default. Learn what leading OpenStack experts said is needed to help make your cloud secure.

READ MORE

How to Stop Advanced Persistent Threats

May 22, 2018 |

A security professional's guide to advanced persistent threats and how to stop and prevent them.

READ MORE

How the Kubernetes Security Response Team Works

May 11, 2018 |

VIDEO: Brandon Philips, former CTO of CoreOS, talks about how the Kubernetes security team works and responds to vulnerability reports.

READ MORE

Key Steps for Optimizing POS Security

May 09, 2018 |

It's not just about PCI DSS compliance – here are the three most important factors in a POS security solution, plus other things you can do to avoid credit card breaches.

READ MORE

What Is SQL Injection and How Can It Hurt You?

May 07, 2018 |

Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.

READ MORE