37,779 Results for:
- Sort by:
Should security funds be dedicated to hiring or tools?
01 Oct 2015Security funds can be tough to come by, so when managers get them should they focus on strengthening security through hiring or through purchasing tools? Read More
Four enterprise scenarios for deploying database security tools
18 Jun 2015Expert Adrian Lane describes the use cases and ways database security tools are used to boost enterprise security. Read More
Security access controls over identities must be priority
11 Sep 2018IT security pros must pay attention to securing identity and access, or their companies will pay the price. Make sure your policies are updated and the best tools are in place. Read More
Are enterprise cloud management tools a security risk?
08 Jan 2016A tool that manages hybrid cloud environments can benefit enterprises, but there are also security risks to consider. Expert Dan Sullivan explains what those risks are. Read More
Guide: Application development and DevOps security
29 Sep 2017This essential guide covers DevOps security tools and how security is becoming more and more necessary in order to avoid application development vulnerabilities. Read More
Informatica enlists cloud workload protection platform for 'zero-trust' IT security
30 Apr 2018To secure its immense cloud operations, Informatica looks to a new tool, a cloud workload protection platform by Aporeto, with a deny-all approach to server access. Read More
McAfee Database Activity Monitoring: Database security tool overview
25 Oct 2015Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Read More
Behavioral analytics, security go hand in hand
15 Jan 2018This Security School explores behavioral analytics as a tool for enhancing the security of enterprise systems and data. Read More
Rely on cloud security policy -- not tools -- to protect AWS
23 Dec 2015AWS boosted its security management offerings at re:Invent, but the cloud provider's shared responsibility model means developers must be attentive and implement policies. Read More
Zero trust is IT security's best hope for effective defense
21 Nov 2019The material collected here provides not just an explanation of why you need to adopt the zero-trust model, it serves as detailed guide on moving from adoption to implementation. Read More