Neal Weinberg

Contributor

Neal Weinberg is a freelance technology writer and editor. He can be reached at neal@misterwrite.net.

6 hard truths security pros must learn to live with

4 key benefits of NOC/SOC integration and tips for making it work

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

5 steps to create a security incident response plan

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

The 10 most powerful cybersecurity companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

The VPN is dying, long live zero trust

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where...

How IT pros deal with SD-WAN security concerns

How IT pros deal with SD-WAN security concerns

When baseline SD-WAN security is not enough, enterprises are adopting extra measures such as intrusion prevention, anti-virus, unified threat management and more

Security spending up, but adoption of cutting-edge tools is slow

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

How to create an effective security policy (and 4 templates to get you started)

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

Guide to top security certifications

Guide to top security certifications

Security professionals are in demand and with the right certification, you’re in even higher demand. To help you decide which certs are for you, we’ve compiled a list of top security certifications -- broken down by category...

Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach

Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach

Enterprise cloud adoption is accelerating, with most companies taking a hybrid approach that entails migrating workloads to the public cloud where possible, and keeping workloads in a private cloud where appropriate. Public cloud...

Protecting Mobile Devices Requires Training and Technology

Protecting Mobile Devices Requires Training and Technology

Despite abundant evidence that attacks on mobile devices continue to increase, many companies still don’t have a mobile security strategy that combines end-user training with strong mobile content management software. This is...

How Google reinvented security and eliminated the need for firewalls

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

Load More