Reviews

binary code, magnifying lens, skull and crossbones

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies.

mousetrap cheese

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

How Contrast Security protects applications from the inside out

Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.

man whispering

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point...

security automation robot protects defends from attack intrusion breach

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders.

Threat hunting guide to securing the enterprise

Review: Mantix4 provides threat hunting as a service

Mantix4 provides robust threat hunting tools for use by clients, but it also takes threat hunting into the software as a service (SaaS) realm, employing a team of experts to hunt on the client's behalf.

Password entry

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure.

black white hat

Hackers are good, not bad

From now on, 'hackers' should refer to white hats instead of black hats.

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

network security primary2

How 3 innovative products approach network security

The network security category is constantly evolving with the emergence of new threats and attack techniques. Here's how 3 network security products tackle the problem.

phishing hack scam malware binary code

GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart.

firewall

Calling Barracuda's WAF a firewall is seriously selling it short

The Barracuda Web Application Firewall (WAF) is more than a firewall, it's like the core of an independent bastion of cybersecurity, able to inspect both inbound and outgoing traffic.

binary monitor tech digital moody hacker threat

How NSS Labs' CAWS finds and fixes network threats

The public instance of the CAWS Continuous Security Validation Platform from NSS Labs is a valuable tool for alerting IT teams about real threats with the ability to breach their defenses. But for networks with high security needs,...

pc antivirus

Bay Dynamics Risk Fabric puts vulnerabilities in context

Many vulnerability management programs will direct IT teams to the critical threat on the non-critical asset, and place a midlevel threat on a critical asset thousands of places down on the priority scale. It’s not the program’s...

cyber attack virus meltdown

Crossbow offers live fire cybersecurity vulnerability testing

The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics...

Unlocked circuit board / security threat

Which vulnerability to fix first? Kenna Security has the answer

Kenna's vulnerability management platform is designed to prioritize the most dangerous vulnerabilities. Here's how it works.

free wifi stumbling surveying 1

8 free Wi-Fi stumbling and surveying tools

Here are 8 free Wi-Fi stumbling and surveying tools to reveal important details about Wi-Fi networks.

hardcore devops fists

How XebiaLabs brings order and efficiency to DevOps projects

DevOps is a hot topic in security these days, and for good reason: Software security flaws are often only discovered after an attacker has exploited them, which can cause huge losses of both data and revenue. Here's a look at how...

fog visibility island

GuardiCore Centra provides visibility, protection through advanced micro segmentation

The GuardiCore Centra solution takes complexity out of micro segmentation by providing visibility into network assets and activity.

thinkstockphotos fence 488873591

How vArmour restores the security perimeter

The vArmour suite of tools is designed, first, to reestablish a software perimeter internally and then to hone the rules and policies that make up that backbone, delving all the way into the realm of micro segmentation.

Load More