Enterprise Applications
Enterprise Applications | News, how-tos, features, reviews, and videos
Review: Morphisec scrambles memory to thwart advanced attacks
With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.
Review: How Nyotron Paranoid puts endpoint security worries to rest
Adding an extra layer of endpoint protection isn't just for the overly cautious.
Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable
HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.
Review: LogRhythm takes SIEM to the next level
LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.
Review: Fidelis Deception breathes life into fake assets
Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.
11 questions to ask before buying AI-enabled security software
Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up...
What can we learn about infosec from the Varsity Blues college admissions scandal?
The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...
Review: JASK ASOC isn't just another overloaded SIEM
The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.
Facebook secretly paid users $20 a month to use VPN spying app
After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.
Review: GreatHorn offers a better way to secure enterprise email
GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.
Review: AttackIQ FireDrill watches the watchers
This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.
Using a password manager: 7 pros and cons
This veteran security pro feels more secure now that he's using a password manager, but there are still risks.
5 open source intrusion detection tools that are too good to ignore
Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.
Review: Senzing uncovers relationships hiding within big data
Used to combat fraud or uncover accidental data duplication, Senzing is a powerful yet lightweight tool with an artificial intelligence that is actually extremely smart.
5 cyber security basics you can't afford to ignore
Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack.
The ethics of creating secure software
The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the...
Can an organization’s biggest assets also be their biggest threats?
Accidental misuse can be one of the most overlooked causes of insider threats today, putting every business function at risk.
What are small organizations doing about cybersecurity?
Firms with 50 to 499 employees are spending more money, purchasing security product suites, and outsourcing security tasks to MSSPs.
AI in cybersecurity: what works and what doesn't
Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in...
Avast pulls CCleaner version that lacked privacy options after backlash
Avast-owned Piriform reverted to a previous version of CCleaner in response to user outrage over its new data collection policy that had no privacy options.