37,415 Results for:

  • Sort by: 

The ins and outs of VMware security products and features

19 Jun 2019

Application control, anomaly detection and VM encryption are some of the ways VMware incorporates security in products such as NSX, AppDefense, vSAN, vSphere and ESXi. Read More

Microsoft Teams calling, Cisco Spark security get updates

19 Dec 2017

New Microsoft telephony tools put some pressure on Skype for Business users to switch to Teams. Meanwhile, Cisco Spark security gets a key certification. Read More

Is the Pwn Phone an effective enterprise security testing tool?

23 Sep 2014

The Pwn Phone can reportedly detect network vulnerabilities instantly, but its use in the enterprise is questionable. Kevin Beaver explains. Read More

What new technique does the Osiris banking Trojan use?

20 Feb 2019

A new Kronos banking Trojan variant was found to use process impersonation to bypass defenses. Learn what this evasion technique is and the threat it poses with Nick Lewis. Read More

How to address the IoT security ticking time bomb

25 Oct 2017

With the right tools, IoT security issues caused by open source components can be addressed. Insignary's TJ Kang explains. Read More

Follow this expert advice to improve security in AWS

16 May 2017

AWS security encompasses server tools and concepts. Enterprises that use the right services, VPCs, encryption and DevSecOps can avoid major gaffes that can expose valuable data. Read More

Embedded application security: Inside OWASP's best practices

15 Feb 2018

OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools. Read More

The HHS security risk assessment tool for HIPAA audit prep

10 Sep 2014

The HHS security risk assessment tool is designed to help healthcare providers meet the HIPAA security requirement. Expert Mike Chapple explains how it works and how it will help your company get ready for the ... Read More

Preparing enterprise systems for the scriptless Linux exploit

07 Apr 2017

The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. Read More

How can AWS Organizations help secure cloud accounts?

25 Jan 2017

A new tool called AWS Organizations aims to make cloud account management more secure. Expert Matthew Pascucci explains how the tool works and how it compares to AWS IAM. Read More