Threats

FireEye, SolarWinds Breaches: Implications and Protections

Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had...

Tokenization vs. Encryption: Which is Better for Protecting Critical Data?

Two of the most popular methods for protecting business data are tokenization and encryption. However, choosing the one that is the best for your...

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Disk vs File Encryption: Which Is Best for You?

Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it's sufficient to...

Best Privileged Access Management (PAM) Software

Privileged accounts are among an organization's biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average...

Microsegmentation: The Next Evolution in Cybersecurity

The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly...

Apple White Hat Hack Shows Value of Pen Testers

    The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of...

Employees and Data Backup Top Cybersecurity Awareness Month Concerns

    October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain, it's only fitting that this year's theme...

IT Security Vulnerability Roundup: June 2019

While it can be challenging to keep up with the wide range of security flaws disclosed each month, it's worth paying attention...

Email Still a Major Attack Vector: Security Research

While modern cyber threats can take different forms and delivery methods, email continues to be one of the primary approaches cyber attackers...

Latest articles