5 things to look for in an XDR solution

5 things to look for in an XDR solution

The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.

Why it's time to shift to extended validation certificates

Why it's time to shift to extended validation certificates

More than ever, a strong organizational identity is essential for building trust with users.

Securing IoT requires a shift to a security fabric

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

5 standout products from RSA 2020

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

Phishing has become the root of most cyber-evil

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

Risk-based vulnerability management a better form of cyber defense

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

Zeek: A free, powerful way to monitor networks, detect threats

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

Google Chrome 70 is coming. Are your security certificates in order?

Google Chrome 70 is coming. Are your security certificates in order?

All Symantec-issued digital certificates will be deprecated on Google Chrome by mid-October. Former Symantec customers must ensure their websites are compliant.

EDR is dead! Long live XDR!

EDR is dead! Long live XDR!

Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

Securing IoT devices: Fortinet's FortiNAC automates the process

Securing IoT devices: Fortinet's FortiNAC automates the process

Fortinet’s network access control solution, FortiNAC, automatically discovers, controls, and enforces Internet of Things (IoT) endpoints.

Arista Networks PICs its spot In security

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.'

Reduce breach risk and costs with security resilience

Reduce breach risk and costs with security resilience

Companies must prepare for when a breach occurs – because chances are, it will happen. Ixia’s Keith Bromley says network security resilience can help.

Cato Networks adds threat hunting to its SD-WAN services

Cato Networks adds threat hunting to its SD-WAN services

Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network.

End-to-end security requires multi-vendor automation

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

RSA roundup: 5 security vendors CISOs need to be aware of

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

So far, so good for Symantec customers affected by Google distrust issue

So far, so good for Symantec customers affected by Google distrust issue

DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

Microsegmentation evolves into a compensating control security tool

Microsegmentation evolves into a compensating control security tool

Illumio integrates Qualys data into its security platform to provide real-time vulnerability maps, enabling organizations to implement microsegmentation as a compensating control.

Palo Alto Networks buys Evident.io, extends its cloud security solution

Palo Alto Networks buys Evident.io, extends its cloud security solution

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

Apple, Cisco, Aon and Allianz partner in cyber risk management

Apple, Cisco, Aon and Allianz partner in cyber risk management

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution.

Load More
Top Blog Posts