Latest Cybersecurity Articles

Best antivirus software: 14 top tools

Best antivirus software: 14 top tools

Dec 6, 2018

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Can Blockchain Fix Cybersecurity?

Can Blockchain Fix Cybersecurity?

Dec 3, 2018

The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.

Lessons From This Year’s Data Center Outages: Focus On the Fundamentals

Lessons From This Year’s Data Center Outages: Focus On the Fundamentals

Nov 27, 2018

Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.

DDoS protection, mitigation and defense: 8 essential tips

DDoS protection, mitigation and defense: 8 essential tips

Nov 27, 2018

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

Nov 15, 2018

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…

Cybersecurity Tools for Data Center Networks are Getting Smarter With Machine Learning

Cybersecurity Tools for Data Center Networks are Getting Smarter With Machine Learning

Nov 14, 2018

New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.

Why the best antivirus software isn’t enough (and why you still need it)

Why the best antivirus software isn’t enough (and why you still need it)

Oct 29, 2018

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

Why even the best antivirus software isn't enough (and why you still need it)

Why even the best antivirus software isn't enough (and why you still need it)

Oct 29, 2018

Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise,…

Are You Spending Too Much (or Too Little) on Cybersecurity?

Are You Spending Too Much (or Too Little) on Cybersecurity?

Oct 18, 2018

Pinpointing the right level of security spend is easy in theory but not in practice.

Best antivirus software: 13 top tools

Best antivirus software: 13 top tools

Oct 11, 2018

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

What is enterprise risk management? How to put cybersecurity threats into a business context

What is enterprise risk management? How to put cybersecurity threats into a business context

Oct 11, 2018

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

7 best practices for working with cybersecurity startups

7 best practices for working with cybersecurity startups

Oct 9, 2018

Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and can often offer more personalized…

CASB, SSO, or PAM? Access Control for Data Center Admins

CASB, SSO, or PAM? Access Control for Data Center Admins

Oct 4, 2018

Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.

How to Secure Your AWS Storage Buckets

How to Secure Your AWS Storage Buckets

Oct 3, 2018

Amazon is responsible for securing its cloud. Your security inside its cloud is on you.

Why Entrusting Security to a Startup May Be Worth the Risk

Why Entrusting Security to a Startup May Be Worth the Risk

Sep 25, 2018

They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.

4 top challenges to a secure digital transformation

4 top challenges to a secure digital transformation

Sep 12, 2018

Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.

California’s New Privacy Act May Drive Tighter Controls in Data Centers

California’s New Privacy Act May Drive Tighter Controls in Data Centers

Aug 30, 2018

The law goes into effect in 2020, but now is a good time to start preparing.

What are next generation firewalls? How the cloud and complexity affect them

What are next generation firewalls? How the cloud and complexity affect them

Aug 27, 2018

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in…

Can Supercomputers Improve Cybersecurity? Not for a While

Can Supercomputers Improve Cybersecurity? Not for a While

Aug 24, 2018

Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.

Corporate pre-crime: The ethics of using AI to identify future insider threats

Corporate pre-crime: The ethics of using AI to identify future insider threats

Aug 20, 2018

To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors.…

Machine Learning Is Becoming a Must in Data Center Network Security

Machine Learning Is Becoming a Must in Data Center Network Security

Aug 17, 2018

The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.

3 reasons companies fail to assess the scope of a data breach

3 reasons companies fail to assess the scope of a data breach

Aug 13, 2018

First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first…

California Consumer Privacy Act: What you need to know to be compliant

California Consumer Privacy Act: What you need to know to be compliant

Jul 30, 2018

California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

5 ways to hack blockchain in the enterprise

5 ways to hack blockchain in the enterprise

Jul 16, 2018

Experts warn of blockchain security risks in non-cryptocurrency use cases.

Does Your Data Center Have Adequate Cyber Insurance?

Does Your Data Center Have Adequate Cyber Insurance?

Jul 9, 2018

As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.

Following Equinix’s Lead, Interxion Gets Into Encryption Key Management

Following Equinix’s Lead, Interxion Gets Into Encryption Key Management

Jun 27, 2018

Interxion has launched an encryption key management service called Key Guardian.

Hardware, software options emerge for runtime encryption

Hardware, software options emerge for runtime encryption

Jun 20, 2018

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

Cloud functions present new security challenges

Cloud functions present new security challenges

Jun 4, 2018

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

The Challenges and Opportunities of Big Data in Cybersecurity

The Challenges and Opportunities of Big Data in Cybersecurity

May 31, 2018

While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.