37,415 Results for:

  • Sort by: 

Ansible Tower revamp adds analytics, security automation

25 Sep 2019

Ansible Tower and Ansible Engine are now one product, Ansible Automation Platform, which also includes automation analytics, security automation integrations and certified content. Read More

Free security tools, architecture to help stay ahead of cybercriminals

03 Dec 2013

In this video Q&A, the former CISO of the CIA shares ways companies can use free security and architecture tools to avoid being victims of cybercrime. Read More

How DevOps tools can be used to integrate cloud automation

17 May 2017

DevOps tools can be used to deploy secure cloud automation. Expert Dave Shackleford looks at how this works and which tools are the best bet for DevSecOps. Read More

Mobile collaboration tools promise secure remote access to content

29 Aug 2014

In this content management news roundup, vendors offer options for secure access to content from mobile devices, and OpenText updates its document management platform for the legal industry. Read More

5 Google Cloud tools you should know

11 Oct 2019

As one of the top cloud vendors, Google provides a wide range of tools and services for its customers. Review five prominent Google Cloud offerings and understand the features each has to offer. Read More

VMware security portfolio grows as security market evolves

30 Sep 2019

The constant evolution of enterprise security presents challenges that VMware hopes to meet as it develops its security portfolio. Read More

Microsoft's EMET security tool useful despite bypasses, say experts

04 Mar 2014

Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy. Read More

Another Intel ME Security Flaw Discovered

22 Nov 2017

As details surrounding another Intel ME security flaw discovered emerge, it's time to grab a detection tool. If you're affected a BIOS fix is needed. Read More

A look at serverless applications and how to secure them

30 Aug 2017

Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured. Read More

What AWS users can learn from the Capital One breach

27 Sep 2019

Don't want to be on the nightly news? Protect sensitive data with cloud security best practices gleaned from what Capital One did wrong -- and what it got right -- during the breach. Read More