Security Software

Security | News, how-tos, features, reviews, and videos

CSO: Have you met these hackers? [slide 04]
email security lock breach protocol by microstockhub getty

security detection monitoring

Will XDR modernize the SOC?

Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

Conceptual image of a password amid hexadecimal code.

4 tools to prevent leaks in public code repositories

Use these tools to find your company's exposed secrets in repositories such as GitLab, GitHub, or Google Cloud Build before attackers do.

cyber technology security protection monitoring concept advanced picture id1276687348

Graylog unites SIEM, AI-based anomaly detection in new security suite

Graylog is consolidating SIEM and UEBA (anomaly detection and user entity behavior analytics) in its new security package for streamlined detection and elimination of enterprise security threats .

please stand by problem technical difficulties tv mistake test screen by filo getty

Facebook outage a prime example of insider threat by machine

A buggy automated audit tool and human error took Facebook offline for six hours. Key lesson for CISOs: Look for single points of failure and hedge your bets.

Antivirus / virus alert / warning / security threats / protection from attack

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

Insider threats  >  Employees suspiciously peering over cubicle walls

How disinformation creates insider threats

Employees who believe disinformation are more susceptible to social engineering and phishing campaigns, and attackers know it.

API security alert / software development / application flow chart diagram

Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises

Researchers at Splunk outline a technique, pioneered by Salesforce, that could detect malicious activity in the software supply chain, but with some limitations.

network security / network traffic scanning

AT&T launches managed XDR suite to provide endpoint-to-cloud security

AT&T is combining security tools including its threat intelligence and detection platform USM Anywhere with endpoint and network security services from partners to roll out a cloud-based, managed XDR platform for end-to-end detection...

A magnifying lens examines top secret information amid binary code.

How corporate data and secrets leak from GitHub repositories

Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

Security threat   >   One endpoint on a network has been compromised.

How to choose an endpoint protection suite

Endpoint protection has come a long way since the days of dedicated antivirus servers. Here are the basic and more advanced features to look for in an enterprise endpoint protection suite.

radar grid / computer circuits / intrusion detection / scanning

5 observations about XDR

The technology is evolving, so security professionals and pundits must be open-minded and closely track market developments.

A magnifying lens examines top secret information amid binary code.

Intellectual property protection: 10 tips to keep IP safe

Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets. This primer covers everything from establishing basic policies and procedures for IP...

iPhone security

10 security tools all remote employees should have

Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

How to review password quality in Active Directory

Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.

data analytics / risk assessment / tracking data or trends

Move over XDR, it's time for security observability, prioritization, and validation (SOPV)

Independent tools and data repositories are coming together for better threat management, impacting organizations, security professionals, and the industry. We need to take the same approach to security hygiene and posture management....

Chaotic streams brought to binary order / holistic organization / taming data structure

How to choose a SIEM solution: 11 key features and considerations

Get a clear, consolidated view of events and threats across your entire enterprise with SIEM (security and event management). Here’s how to select the best SIEM solution based on your company’s unique assortment of needs.

Load More