Mary K. Pratt

Contributing Writer

Mary K. Pratt is a freelance writer based in Massachusetts.

3 top multi-cloud security challenges, and how to build a strategy

Secrets of 'shift left' success

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

For strong API security, you need a program not a piecemeal approach

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

Evaluating patch management software: 6 key considerations

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

6 steps for a solid patch management process

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

What is an intrusion detection system (IDS)? A valued function with significant challenges

What is an intrusion detection system (IDS)? A valued function with significant challenges

An intrustion detection system (IDS) is a software application or hardware appliance that monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds...

What is Zero Trust? A model for more effective security

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

5 ways users circumvent security measures and how to prevent it

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

What is SIEM software? How it works and how to choose the right tool

What is SIEM software? How it works and how to choose the right tool

Evolving beyond its log-management roots, today's security information and event management (SIEM) software vendors are introducing machine learning, advanced statistical analysis and other analytic methods to their products.

How to cope when mobile app development goes rogue

How to cope when mobile app development goes rogue

Business units often develop mobile apps on their own, turning to IT only when things go wrong. Better governance around business units and their mobile app demands can help alleviate the worst pain points.

Security among the hottest tech skills for 2017

Security among the hottest tech skills for 2017

Are your assets bankable in 2017? Hiring managers say they'll seek out these skills most in the New Year.

Security can't be left behind at a rapidly growing company

Security can't be left behind at a rapidly growing company

CIOs are finding ways to meet both the growing business needs as well as the evolving and increasing security requirements – without sacrificing the speed needed in fast-growing companies.

Load More