Security Software
Security | News, how-tos, features, reviews, and videos
Inside cybersecurity’s shelfware problem
Sometimes underutilization of security software and services is a deliberate, strategic choice; more often it's a cause for concern.
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.
Why you should consider outsourcing DLP
Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.
Beyond the firewall: Intrusion Detection Systems
Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.
5 open source intrusion detection systems for SMBs
If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.
Preparing for Flash and Office 2010 end-of-life
The imminent end of Microsoft's support for Adobe Flash is a good excuse to see what other end-of-life applications running on your Windows network could leave you vulnerable.
Five ways to keep working from home safe for your employees and your company
For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.
You're going to be using confidential computing sooner rather than later
These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.
7 things to consider when choosing managed detection and response
Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.
15 signs you've been hacked—and how to fight back
Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.
What is DLP? How data loss prevention software works and why you need it
Data loss prevention (DLP) is a set of practices (and products) that ensure that an organization's sensitive or critical data is kept safe.
Microsoft 365 Apps update changes: What security admins need to know
Microsoft has renamed its Office 365 update channels and added options. You might have to make changes in your configuration and deployment tools.
Local attackers can use Group Policy flaw to take over enterprise Windows systems
Microsoft issues a patch to fix a flaw that could allow compromised non-privileged user accounts to place malicious DLLs on a system.
10 things you should know about XDR
An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.
Android security: Patching improves, but fragmentation challenges remain
A new report shows that Android mobile device manufacturers are getting better at patching the OS, but patching levels vary across models and vendors.
Is enterprise security broken?
Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.
New platform AttackerKB gives defenders more context on vulnerabilities
Real-world input from pen testers and other members of the security community aims to help defenders make better assessments of vulnerability risks.
12 top IDS/IPS tools
An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.
-
Data Sheet
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
Analyst Report
Sponsored -
Analyst Report
Sponsored
BrandPosts
Learn more-
Sponsored by Hewlett Packard