Private vs. public cloud security: Benefits and drawbacks

Regardless of whether an enterprise’s infrastructure operates in a private, public or hybrid cloud, cybersecurity is a critical component. While some cloud architectures greatly simplify security tasks and tool... Read more »

How to create a cloud security policy, step by step

By Published: 21 Jan 2021 Organizations using cloud technology to support operations must follow good security practices. Establishing cloud security policies is key to achieving this. In short, a... Read more »

Select a customer IAM architecture to boost business, security

The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have timely access to the resources needed to complete their... Read more »

Extended detection and response tools take EDR to next level

Endpoint detection and response tools protect organizations’ endpoints by monitoring for suspicious behavior and collecting system activities and events. Many are equipped to automatically respond to threats, such as... Read more »

The human firewall’s role in a cybersecurity strategy

Businesses must prioritize cybersecurity now more than ever. This process requires a broader scope than investing heavily in security technologies, however — the tactic most companies have relied on... Read more »

Editor’s picks: Top cybersecurity articles of 2020

Many 2020 cybersecurity predictions were thrown out of orbit when coronavirus cases emerged and COVID-19 was declared a global pandemic by the World Health Organization in March. This year,... Read more »

Endpoint security quiz: Test your knowledge

Konstantin Emelyanov – Fotolia By Today’s security teams are under immense pressure, faced with having to secure the rapid, widespread adoption of IoT in the enterprise. Factor in the... Read more »

Surrounded by Stacks of Paper? How to Organize Your Important Documents

Share It’s hard to get any work done when you’re surrounded by papers on your desk, or even your countertops and tables. Whether they’re cluttered with newspapers, bills, or... Read more »

How cloud-based SIEM tools benefit SOC teams

By Published: 09 Dec 2020 One of the most prevalent technologies used in security operations centers today is the SIEM platform. However, SOC teams are struggling to adapt on-premises... Read more »

Disney+ is the best app of the year, according to Google Play users (Engadget)

Google Play has announced the winners of its year-end awards, including users’ and editors’ picks for the best apps, movies, TV shows and books. As has been the case... Read more »
Subscribe to our Newsletter