Threats

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Disk vs File Encryption: Which Is Best for You?

Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it's sufficient to...

Best Privileged Access Management (PAM) Software

Privileged accounts are among an organization's biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average...

Microsegmentation: The Next Evolution in Cybersecurity

The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly...

Apple White Hat Hack Shows Value of Pen Testers

The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties...

Employees and Data Backup Top Cybersecurity Awareness Month Concerns

October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain,...

IT Security Vulnerability Roundup: June 2019

While it can be challenging to keep up with the wide range of security flaws disclosed each month, it's worth paying attention...

Email Still a Major Attack Vector: Security Research

While modern cyber threats can take different forms and delivery methods, email continues to be one of the primary approaches cyber attackers...

IT Security Vulnerability Roundup: May 2019

IT security is all about staying on top of vulnerabilities. Many of those...

How to Build & Run a Threat Hunting Program

Every company has cybersecurity systems in place to try to keep attackers off...

Latest articles

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Best Encryption Tools & Software for 2020

Enterprises can invest in state of the art threat defenses like next-gen firewalls, microsegmentation and zero trust tools, but even the very best tools...

SASE: Securing the Network Edge

Dramatic growth in Internet of Things (IoT) devices and external users have forced IT departments to move storage and processing functions closer to the...

Kaspersky vs. Bitdefender: EDR Solutions Compared

Kaspersky and Bitdefender have very good endpoint security products for both business and consumer users, so they made both our top EDR and top...