Trends

Cybersecurity Employment Outlook 2021

The massive SolarWinds breach drove home the point that the cybersecurity threat only gets worse with time, the stakes higher - and the tools...

Apple White Hat Hack Shows Value of Pen Testers

The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties...

Employees and Data Backup Top Cybersecurity Awareness Month Concerns

October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain,...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list...

Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

Foster City, CA, Feb. 06, 2019 -- eSecurityPlanet.com, a top online resource for IT...

10 Vendors Making News at Black Hat USA 2018

The core of the Black Hat USA conference is security research, but in recent years it has also become a chance for...

Top 10 Talks to See at Black Hat USA 2018

The Black Hat USA security conference has an allure unlike no other cybersecurity...

How F5 Networks’ CISO Defends the Enterprise

Mike Convertino joined F5 Networks as the company's first Chief Information Security Officer...

RFP Lessons Learned from Monty Python: Oracle CSO

SAN FRANCISCO — Request for Proposals (RFPs) are a cornerstone of the IT...

Redefining Cybersecurity to Protect Next-Generation Digital Transformation

SAN FRANCISCO — The way analysts looked at the cybersecurity market five years...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...