Tune in to AWS Partners LIVE!, streaming directly from AWS marquee events like re:Invent and re:Inforce, to catch all the breaking news and exclusive insights. Sponsored by AWS.
Foster City, CA, Feb. 06, 2019 — eSecurityPlanet.com, a top online resource for IT security professionals and vendors, released its 2019 State of IT Security survey. This year’s results highlight an…
Endpoint Detection and Response (EDR) solutions are one of the most important tools in the IT security arsenal, offering continuous monitoring and response to stop advanced security threats. But picking…
By Maxim Sovetkin, Itransition Millions of email and social networking logins and passwords become public almost every month. You don’t have to be an IT guru to realize that a…
By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website is most likely being targeted…
By Aleksey Gavrilenko, Itransition Approaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization standard that provides secure access to server…
By Jeremy Moskowitz, PolicyPak Software In the case of your typical Windows domain network, it is “traditional wisdom” that only Microsoft DNS must be used with Active Directory for internal…
Sekhar Sarukkai, Skyhigh Networks “If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would…
By John Bruce, Resilient This is the decade of response. It’s officially arrived. After decades of focusing on preventing and detecting cyberattacks, security leaders are finally treating how they respond…
Get the free newsletter
Subscribe to Cybersecurity Insider for top news, trends & analysis