37,242 Results for:

  • Sort by: 

Kaspersky KLara malware hunter now open source

30 Mar 2018

Kaspersky's KLara tool has been made open source in an effort to help security professionals search related malware samples more easily and efficiently with distributed Yara rules. Read More

HashiCorp Vault Enterprise automates distributed security

23 Mar 2017

Vault is intriguing to enterprises, but adoption can be a slow process in large, complex environments with legacy security tools. Read More

The ins and outs of VMware security products and features

19 Jun 2019

Application control, anomaly detection and VM encryption are some of the ways VMware incorporates security in products such as NSX, AppDefense, vSAN, vSphere and ESXi. Read More

What's new with desktop virtualization management?

06 Feb 2018

When it comes to VDI management, security and user experience are paramount. IT can use a host of tools, including monitoring, to keep an eye on both areas. Read More

Essential SQL Server security tools

04 Jan 2013

Read this tip where writer Ashish Kumar Mehta shares his all-time favorite native and third-party SQL Server security tools. Read More

The difference between security assessments and security audits

24 Aug 2017

Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden ... Read More

Combatting the top cybersecurity threats with intelligence

22 Dec 2016

Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers... Read More

Third-party application security evaluation tools and services

25 Jul 2014

Learn about the tools and services available that enterprises can use to determine the security of their third-party applications. Read More

What new technique does the Osiris banking Trojan use?

20 Feb 2019

A new Kronos banking Trojan variant was found to use process impersonation to bypass defenses. Learn what this evasion technique is and the threat it poses with Nick Lewis. Read More

Lock down private cloud security with strict procedures, tools

24 Jul 2014

Despite opinions to the contrary, private cloud isn't secure just because it's private. Private cloud security requires a well-thought-out plan and frequent checks to avoid a disaster. Read More