Search results for: “threat intelligence”
-
Weekly Vulnerability Recap – December 18, 2023 – JetBrains TeamCity Exploits Continue
Learn about last week’s open-source software vulnerabilities, endangered data, and attacks from state-sponsored Russian threat groups.
-
Whitelisting vs Blacklisting: How Are They Different?
Trying to decide whether to whitelist or blacklist IPs or apps for network security? Discover what the differences are and why you should probably do…
-
Kali Linux Penetration Testing Tutorial: Step-By-Step Process
Kali Linux turns 10 this year, and to celebrate, the Linux penetration testing distribution has added defensive security tools to its arsenal of open-source security…
-
Versa Unified SASE Review & Features
Explore the features, pros, cons, and pricing of Versa’s Secure Access Service Edge (SASE) solution to secure remote assets in detail.
-
Palo Alto Prisma SASE Review & Features
Explore the features, pros, cons, and pricing of Palo Alto Prisma SASE, a Secure Access Service Edge (SASE) solution to secure remote assets in detail.
-
Microsoft Patch Tuesday Includes Word, Streaming Service Zero-Days
Microsoft’s Patch Tuesday for September 2023 includes 59 vulnerabilities, five of them rated critical and two currently being exploited in the wild. The two vulnerabilities…
-
Cybersecurity Mergers Flatline – Here’s Why That Won’t Last
Much like the rest of technology, merger and acquisition (M&A) activity for cybersecurity companies has been in a slump this year. There are a number…
-
6 Best IT Asset Management (ITAM) Software
Make informed decisions on IT asset management software. Compare features, integrations, and pricing. Find the perfect solution for your business needs.
-
What Is Edge Security? Overcoming Edge Computing Risks
Traditional network security ends at the firewall. Learn how to secure remote users, cloud resources, and devices outside of the network.
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)