Best antivirus software: 14 top tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
Can Blockchain Fix Cybersecurity?
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Lessons From This Year’s Data Center Outages: Focus On the Fundamentals
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
DDoS protection, mitigation and defense: 8 essential tips
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.
What is the cyber kill chain? Why it's not always the right approach to cyber attacks
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…
Cybersecurity Tools for Data Center Networks are Getting Smarter With Machine Learning
New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.
Why the best antivirus software isn’t enough (and why you still need it)
Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.
Why even the best antivirus software isn't enough (and why you still need it)
Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise,…
Are You Spending Too Much (or Too Little) on Cybersecurity?
Pinpointing the right level of security spend is easy in theory but not in practice.
Best antivirus software: 13 top tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
What is enterprise risk management? How to put cybersecurity threats into a business context
Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
7 best practices for working with cybersecurity startups
Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and can often offer more personalized…
CASB, SSO, or PAM? Access Control for Data Center Admins
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
How to Secure Your AWS Storage Buckets
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
Why Entrusting Security to a Startup May Be Worth the Risk
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
4 top challenges to a secure digital transformation
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
California’s New Privacy Act May Drive Tighter Controls in Data Centers
The law goes into effect in 2020, but now is a good time to start preparing.
What are next generation firewalls? How the cloud and complexity affect them
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in…
Can Supercomputers Improve Cybersecurity? Not for a While
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.
Corporate pre-crime: The ethics of using AI to identify future insider threats
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors.…
Machine Learning Is Becoming a Must in Data Center Network Security
The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.
3 reasons companies fail to assess the scope of a data breach
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first…
California Consumer Privacy Act: What you need to know to be compliant
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
5 ways to hack blockchain in the enterprise
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Does Your Data Center Have Adequate Cyber Insurance?
As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.
Following Equinix’s Lead, Interxion Gets Into Encryption Key Management
Interxion has launched an encryption key management service called Key Guardian.
Hardware, software options emerge for runtime encryption
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions present new security challenges
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
The Challenges and Opportunities of Big Data in Cybersecurity
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
Biggest Web Security Vulnerabilities Haven’t Changed Much — And That’s Not a Good Thing
After 15 years, the OWASP Top 10 list remains largely the same