37,779 Results for:

  • Sort by: 

Should security funds be dedicated to hiring or tools?

01 Oct 2015

Security funds can be tough to come by, so when managers get them should they focus on strengthening security through hiring or through purchasing tools? Read More

Four enterprise scenarios for deploying database security tools

18 Jun 2015

Expert Adrian Lane describes the use cases and ways database security tools are used to boost enterprise security. Read More

Security access controls over identities must be priority

11 Sep 2018

IT security pros must pay attention to securing identity and access, or their companies will pay the price. Make sure your policies are updated and the best tools are in place. Read More

Are enterprise cloud management tools a security risk?

08 Jan 2016

A tool that manages hybrid cloud environments can benefit enterprises, but there are also security risks to consider. Expert Dan Sullivan explains what those risks are. Read More

Guide: Application development and DevOps security

29 Sep 2017

This essential guide covers DevOps security tools and how security is becoming more and more necessary in order to avoid application development vulnerabilities. Read More

Informatica enlists cloud workload protection platform for 'zero-trust' IT security

30 Apr 2018

To secure its immense cloud operations, Informatica looks to a new tool, a cloud workload protection platform by Aporeto, with a deny-all approach to server access. Read More

McAfee Database Activity Monitoring: Database security tool overview

25 Oct 2015

Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Read More

Behavioral analytics, security go hand in hand

15 Jan 2018

This Security School explores behavioral analytics as a tool for enhancing the security of enterprise systems and data. Read More

Rely on cloud security policy -- not tools -- to protect AWS

23 Dec 2015

AWS boosted its security management offerings at re:Invent, but the cloud provider's shared responsibility model means developers must be attentive and implement policies. Read More

Zero trust is IT security's best hope for effective defense

21 Nov 2019

The material collected here provides not just an explanation of why you need to adopt the zero-trust model, it serves as detailed guide on moving from adoption to implementation. Read More