
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.

Why it's time to shift to extended validation certificates
More than ever, a strong organizational identity is essential for building trust with users.

Securing IoT requires a shift to a security fabric
The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

5 standout products from RSA 2020
2020 will be remembered as the year the human element finally came to security.

Phishing has become the root of most cyber-evil
Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

Risk-based vulnerability management a better form of cyber defense
By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

Zeek: A free, powerful way to monitor networks, detect threats
Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

Google Chrome 70 is coming. Are your security certificates in order?
All Symantec-issued digital certificates will be deprecated on Google Chrome by mid-October. Former Symantec customers must ensure their websites are compliant.

EDR is dead! Long live XDR!
Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

Securing IoT devices: Fortinet's FortiNAC automates the process
Fortinet’s network access control solution, FortiNAC, automatically discovers, controls, and enforces Internet of Things (IoT) endpoints.

Arista Networks PICs its spot In security
After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.'

Reduce breach risk and costs with security resilience
Companies must prepare for when a breach occurs – because chances are, it will happen. Ixia’s Keith Bromley says network security resilience can help.

Cato Networks adds threat hunting to its SD-WAN services
Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network.

End-to-end security requires multi-vendor automation
To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

RSA roundup: 5 security vendors CISOs need to be aware of
Here are five companies that security professionals should consider in their quest to keep their organizations secure.

So far, so good for Symantec customers affected by Google distrust issue
DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

Microsegmentation evolves into a compensating control security tool
Illumio integrates Qualys data into its security platform to provide real-time vulnerability maps, enabling organizations to implement microsegmentation as a compensating control.

Palo Alto Networks buys Evident.io, extends its cloud security solution
With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

Palo Alto Networks extends security to the big 3 public clouds
Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

Apple, Cisco, Aon and Allianz partner in cyber risk management
Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution.