Threats

Ransomware Protection in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A...

Types of Malware & Best Malware Protection Practices

Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...

Guarding Against Solorigate TTPs

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...

Cybersecurity Outlook 2021: Trends and Predictions

Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...

FireEye, SolarWinds Breaches: Implications and Protections

Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had...

Tokenization vs. Encryption: Which is Better for Protecting Critical Data?

Two of the most popular methods for protecting business data are tokenization and encryption. However, choosing the one that is the best for your...

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...