WhiteHat Security Rebrands as NTT Application Security
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019. Read More
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019. Read More
Why security pros are frustrated with cloud security
Companies are struggling to keep up with cloud security, with 55% of security professionals believing at least half their time is wasted, in part because security event data is of uneven quality, which leads to false positives, according to a new report. According to the report by cloud automation firm Lacework, based on a survey of […] Read More
Companies are struggling to keep up with cloud security, with 55% of security professionals believing at least half their time is wasted, in part because security event data is of uneven quality, which leads to false positives, according to a new report. According to the report by cloud automation firm Lacework, based on a survey of […] Read More
EFF, Security Experts Condemn Politicization of Election Security
Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security." Read More
Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security." Read More
IoT Security Firm to Acquire Medical Security Startup
Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things Read More
Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things Read More
The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks. Read More
The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks. Read More
Security Architecture Assessment
Read the whitepaper to learn how a security architecture assessment can identify gaps and roadmap a path to address them. Read More
Read the whitepaper to learn how a security architecture assessment can identify gaps and roadmap a path to address them. Read More
Read More
IoT Security Summit
IoT Security Summit will cover the latest topics including edge for security, securing your device, security and the cloud & IT/OT security.
IoT Security Summit will cover the latest topics including edge for security, securing your device, security and the cloud & IT/OT security.
Cloudflare Expands Email Security and WAF, Announces API Security Service
As the company continues to evolve from its CDN roots. Read More
As the company continues to evolve from its CDN roots. Read More
Rapid7 Acquires Kubernetes Security Provider Alcide to Increase Cloud Security
This is Rapid7's second cloud security acquisition in the past nine months. Read More
This is Rapid7's second cloud security acquisition in the past nine months. Read More
Increase in Physical Security Incidents Adds to IT Security Pressures
A new study shows that many organizations have changed their physical security strategies to address new concerns since the COVID-19 outbreak. Read More
A new study shows that many organizations have changed their physical security strategies to address new concerns since the COVID-19 outbreak. Read More
When You Know Too Much: Protecting Security Data from Security People
As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats. Read More
As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats. Read More
AdaptiveMobile Security reckons 5G network slicing contains a major security flaw
Research published by mobile security specialist AdaptiveMobile claims all the extra complexity created by network slicing leads to new vulnerabilities. Read More
Research published by mobile security specialist AdaptiveMobile claims all the extra complexity created by network slicing leads to new vulnerabilities. Read More
Why Security Awareness Training Should Be Backed by Security by Design
Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior. Read More
Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior. Read More
Is It Better to Outsource Security or Handle Security In-House?
The decision to outsource security or handle it all in-house hinges on resources and risk. Read More
The decision to outsource security or handle it all in-house hinges on resources and risk. Read More
Users Have Risky Security Habits, but Security Pros Aren't Much Better
Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences. Read More
Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences. Read More
3 Mobile Security Problems That Most Security Teams Haven't Fixed Yet
Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located. Read More
Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located. Read More
Download this report and learn what your peers are saying about workloads and multi cloud. Read More
Download this report and learn what your peers are saying about workloads and multi cloud. Read More
Application Security Trend Report
Receive an application security checklist and follow the latest trends in DevSecOps. Read More
Receive an application security checklist and follow the latest trends in DevSecOps. Read More
Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More
Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More
Redefining Network Security eBook
Learn how the Cisco Secure Firewall + Workload integration enables the NetOps team to start running at DevOps speed. Read More
Learn how the Cisco Secure Firewall + Workload integration enables the NetOps team to start running at DevOps speed. Read More
The Cloud Security Partnership
Cloud security is a shared responsibility between the businesses leveraging the cloud and their cloud service providers. Here are tips on how to build and maintain robust security models. Read More
Cloud security is a shared responsibility between the businesses leveraging the cloud and their cloud service providers. Here are tips on how to build and maintain robust security models. Read More
Vulnerabilities found in three most recent versions of macOS. Read More
Vulnerabilities found in three most recent versions of macOS. Read More
Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More
Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More
To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity. Read More
To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity. Read More
Endpoint Security Buyers Guide
This guide provides clarity by walking you through the key endpoint security technologies to ensure you have the right protection in place. Read More
This guide provides clarity by walking you through the key endpoint security technologies to ensure you have the right protection in place. Read More
Fusion Connect Intros Security Portfolio, Wants to Ease Burden on Security Teams
“Heavier workloads, unfilled positions and security employee burnout are making things especially chaotic in cybersecurity.” Read More
“Heavier workloads, unfilled positions and security employee burnout are making things especially chaotic in cybersecurity.” Read More
IT Facing Major Security Issues, But Cloud Security May Be Most Immense
A number of reports point to security problems within client environments, but cloud could be the biggest. Read More
A number of reports point to security problems within client environments, but cloud could be the biggest. Read More
Charting the Road to Security Revenue: Growing Your Security Practice with WatchGuard
As midmarket businesses evolve their IT environment, suffering a breach should not be a rite of passage, yet 53% have experienced at least two security incidents in the last 24 months. Despite being smaller than their large enterprise counterparts, midmarket organizations typically retain a wealth of valuable data, but fewer resources with which to defend […] Read More
As midmarket businesses evolve their IT environment, suffering a breach should not be a rite of passage, yet 53% have experienced at least two security incidents in the last 24 months. Despite being smaller than their large enterprise counterparts, midmarket organizations typically retain a wealth of valuable data, but fewer resources with which to defend […] Read More
no results found.