37,403 Results for:

  • Sort by: 

Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool

30 Oct 2015

Expert Michael Cobb details the changes in SHA-3, including how it differs from its predecessors and the additional security it offers, and what steps enterprises should take. Read More

How to identify and manage cloud security misconfigurations

01 Aug 2018

Identifying cloud security misconfigurations and decreasing the potential impact doesn't have to be complicated. Expert Ed Moyle outlines the tools and resources needed. Read More

DevSecOps delivers better business

29 Jan 2019

Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to ... Read More

Do you need third-party email security tools?

30 Jun 2015

Think you have a grip on email security? Ask these nine questions to determine if native security tools are enough or if you need a third-party tool. Read More

Malware detection tool tackles medical device security

07 May 2015

WattsUpDoc, an embedded system security tool used to detect malware in medical devices, is now in beta testing at two major U.S. hospitals. Read More

Vaizey launches cyber security learning tool for HR professionals

05 Feb 2016

The government and the CIPD have launched a free e-learning module to help HR professionals protect sensitive HR data and educate the wider workforce about cyber security Read More

Microsoft Teams app takes aim at vertical markets

24 Sep 2018

Microsoft is adding secure messaging tools for healthcare workers and a schedule management system to the Microsoft Teams app, which is now used by 329,000 organizations worldwide. Read More

AWS logging tools provide extra security

27 May 2015

Those apprehensive of public cloud often cite a lack of security as a concern, but monitoring AWS with native and third-party tools can ease your mind. Read More

Navigate Android encryption software from OEMs, EMM vendors

26 Sep 2019

IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Read More

Cloud migration planning: Assess workloads now to avoid trouble later

30 Apr 2018

Organizations that take the time to assess workloads, identify dependencies and educate themselves on cloud security tools can set a smooth path for a public cloud deployment. Read More