Security Software

Security | News, how-tos, features, reviews, and videos

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms
Security system alert: 'DANGER'

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

Coca-Cola trade secret theft underscores importance of insider threat early detection

A research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola, but wasn't caught until she attempted to steal similar data from another company.

puzzle pieces / network / connections / component parts of a whole / microservices

Why XDR must include MDR

Technology alone isn't enough; organizations need help with security operations.

succession brain sharing intellectual knowledge sharing

US government calls for better information sharing in wake of SolarWinds, Exchange attacks

The Biden administration seeks ways to better gather and share security intelligence from the private sector, but experts see barriers to success.

mobile security / threat detection / traffic analysis

XDR is coming: 5 steps CISOs should take today

Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

How to select a DLP solution: 9 unusual considerations

Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.

man with feather duster makeover clean dust

Inside cybersecurity’s shelfware problem

Sometimes underutilization of security software and services is a deliberate, strategic choice; more often it's a cause for concern.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

5 things to look for in an XDR solution

The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.

Insider threats  >  Employees suspiciously peering over cubicle walls

Why you should consider outsourcing DLP

Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

radar grid / computer circuits / intrusion detection / scanning

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.

RIP - grave - tombstone - cemetery - death [Image by Rob van der Meijden - CC0 via Pixabay]

Preparing for Flash and Office 2010 end-of-life

The imminent end of Microsoft's support for Adobe Flash is a good excuse to see what other end-of-life applications running on your Windows network could leave you vulnerable.

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

radar grid / computer circuits / intrusion detection / scanning

7 things to consider when choosing managed detection and response

Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.

open faucets leaking binary streams of data

What is DLP? How data loss prevention software works and why you need it

Data loss prevention (DLP) is a set of practices (and products) that ensure that an organization's sensitive or critical data is kept safe.

microsoft 365 channel attributes apps

Microsoft 365 Apps update changes: What security admins need to know

Microsoft has renamed its Office 365 update channels and added options. You might have to make changes in your configuration and deployment tools.

Microsoft Windows 7 security patches/updates

Local attackers can use Group Policy flaw to take over enterprise Windows systems

Microsoft issues a patch to fix a flaw that could allow compromised non-privileged user accounts to place malicious DLLs on a system.

integration / exchange / unification / cohesion / unified blocks

10 things you should know about XDR

An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

Load More