Threats

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...

Cybersecurity Outlook 2021: Trends and Predictions

Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...

FireEye, SolarWinds Breaches: Implications and Protections

Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had...

Tokenization vs. Encryption: Which is Better for Protecting Critical Data?

Two of the most popular methods for protecting business data are tokenization and encryption. However, choosing the one that is the best for your...

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Disk vs File Encryption: Which Is Best for You?

Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it's sufficient to...

Best Privileged Access Management (PAM) Software

Privileged accounts are among an organization's biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average...

Microsegmentation: The Next Evolution in Cybersecurity

The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...