Search results for: “threat intelligence”
-
Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles
The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious…
-
What Is Managed Detection and Response? Guide to MDR
Managed detection and response (MDR) goes beyond other managed security services by essentially giving organizations their own expert security analyst team to help identify and…
-
What is Employee Monitoring? Full Guide to Getting It Right
Businesses have long wondered if employees are staying focused and doing their jobs. To answer this question, many in the modern age have turned to…
-
Cloud Security: The Shared Responsibility Model
Cloud security builds off of the same IT infrastructure and security stack principles of a local data center. However, a cloud vendor offering provides a…
-
Top Unified Endpoint Management (UEM) Solutions
Unification has been a trend in IT for a long time, whether it’s communications, storage, data management or other technologies, and the trend hasn’t escaped…
-
Okta ‘Breaches’ Weren’t Really Breaches
With two high-profile breaches this year, Okta, a leader in identity and access management (IAM), made the kind of headlines that security vendors would rather…
-
The Challenges Facing the Passwordless Future
For years the tech industry has promised a shift toward a passwordless future. In 2013, for example, the FIDO Alliance was created to solve the…
-
Software Supply Chain Security Guidance for Developers
Whether it’s package hijacking, dependency confusing, typosquatting, continuous integration and continuous delivery (CI/CD) compromises, or basic web exploitation of outdated dependencies, there are many software…
-
Best Fraud Management Systems & Detection Tools
Fraud is one of the most prevalent vulnerabilities in the modern world. According to the FTC, over 28 million fraud reports were filed by consumers,…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)