Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Evaluating patch management software: 6 key considerations

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

What is an intrusion detection system (IDS)? A valued function with significant challenges

What is an intrusion detection system (IDS)? A valued function with significant challenges

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

For strong API security, you need a program not a piecemeal approach

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

5 ways users circumvent security measures and how to prevent it

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

What is SIEM software? How it works and how to choose the right tool

What is SIEM software? How it works and how to choose the right tool

Evolving beyond its log-management roots, today's security information and event management (SIEM) software vendors are introducing machine learning, advanced statistical analysis and other analytic methods to their products.

How to cope when mobile app development goes rogue

How to cope when mobile app development goes rogue

Business units often develop mobile apps on their own, turning to IT only when things go wrong. Better governance around business units and their mobile app demands can help alleviate the worst pain points.

Security among the hottest tech skills for 2017

Security among the hottest tech skills for 2017

Are your assets bankable in 2017? Hiring managers say they'll seek out these skills most in the New Year.

Security can't be left behind at a rapidly growing company

Security can't be left behind at a rapidly growing company

CIOs are finding ways to meet both the growing business needs as well as the evolving and increasing security requirements – without sacrificing the speed needed in fast-growing companies.

Balancing privacy with data collection in Allstate mobile app

Balancing privacy with data collection in Allstate mobile app

The insurance company collects telematics information from drivers with its Drivewise app, but says customers are comfortable trading information for enhanced safety.

Where does security fit in bi-modal IT departments?

Where does security fit in bi-modal IT departments?

There seems to be disagreement as to whether security workers should be in the innovation camp or look after the day-to-day operations.

Load More