Features

hand holding magnifying glass over contract

What are blockchain’s smart contracts? And how to secure them

Smart contracts are moving into the enterprise, but they aren’t bulletproof. These are the vulnerabilities and best practices for securing them.

pc antivirus

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

wrenches in different sizes / an iterative process of development or repair

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

blockchain links

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

passwords

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

security trust

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

digital security concept > lock / keyhole / circuits / network connections

4 top challenges to a secure digital transformation

Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.

lock spyware security network hacker crime antivirus

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat.

botnet bots

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

intro data breach circuit board technology security

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact.

security bug

What is a chaff bug? How adding bugs to apps may make them more secure

Researchers at NYU have developed a technique to add inert bugs in code to deter hackers. But could it work in reality?

intro security vulnerability

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

facial recognition - biometric security identification

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

lock binary circuits

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.

Load More