37,417 Results for:

  • Sort by: 

Latest iOS vulnerability puts mobile security in the spotlight

12 Sep 2019

In this Q&A, sort through all the confusion regarding Google Project Zero's report on a major iOS vulnerability and determine how it should change your security policies. Read More

MSP ransomware attack exploits privileged users' credentials

27 Sep 2019

WatchGuard Technologies said recent MSP ransomware attacks revealed that hackers have detailed knowledge of managed service providers' internal operations and technologies. Read More

Third-party application security evaluation tools and services

25 Jul 2014

Learn about the tools and services available that enterprises can use to determine the security of their third-party applications. Read More

Lock down private cloud security with strict procedures, tools

24 Jul 2014

Despite opinions to the contrary, private cloud isn't secure just because it's private. Private cloud security requires a well-thought-out plan and frequent checks to avoid a disaster. Read More

Combatting the top cybersecurity threats with intelligence

22 Dec 2016

Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers... Read More

CISOs think cloud safer, but security fears remain

03 Sep 2019

The majority of information security leaders think cloud is now safer than on-premise, but security fears remain, with recently breached and highly regulated organisations most concerned, poll reveals Read More

Palo Alto Networks buys Twistlock, PureSec for container security

31 May 2019

Palo Alto Networks snaps up Twistlock and PureSec to broaden its cloud security portfolio and give enterprise IT shops more options for container and serverless security. Read More

Automating IoT security requires 20/20 vision

09 Aug 2019

Even though IoT security does not have the same standards as other IT technology, organizations need to prioritize bringing all IoT endpoints under a corporate security policy, Lumeta's Reggie Best ... Read More

The difference between security assessments and security audits

24 Aug 2017

Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden ... Read More

New tool eases enterprise file sync-and-share searches, security

27 Mar 2015

SearchYourCloud's new tool gives users a way to search multiple cloud sync-and-share services on mobile and desktops, with file-level security. Read More