38,073 Results for:

  • Sort by: 

Protegrity Database Protector: Database security tool overview

25 Oct 2015

Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of ... Read More

Build secure coding practices right into the IDE

27 Apr 2018

Tools that integrate secure coding practices into the IDE promise to improve software security, even if the app in question isn't secure by design. Read More

Many UK firms ill-equipped to deal the cloud security risks

06 Feb 2018

Many UK firms do not have the security tools, processes and skills required to ensure their cloud implementations are secure, a security researcher and advocate warns Read More

AI cybersecurity tools help spot threats before they cause harm

05 Nov 2018

Security pros are increasingly using AI-based cybersecurity tools to stay one step ahead of hackers and minimize vulnerabilities before they can be exploited by bad actors. Read More

Comparing the top security analytics tools in the industry

06 Jul 2015

Expert Dan Sullivan examines the top security analytics products to help readers determine which may be best for their organization. Read More

Jargon Buster Guide to Container Security

19 Feb 2019

The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the ... Read More

How Shodan helps identify ICS cybersecurity vulnerabilities

04 Oct 2018

Shodan can be a helpful tool for security pros to locate ICS cybersecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works and how it can be used for security. Read More

Swiss Army knife security? How to vet cybersecurity tools suites

02 Dec 2015

Vendors are offering new delivery models for cybersecurity tools as product categories mature and become commoditized. More security technology from a handful of providers can be a good thing. But compilations of ... Read More

How to track Office 365 guest users

03 Oct 2018

Administrators should get familiar with the platform tools at their disposal to check Office 365 Groups access and ensure tenant security. Read More

How to secure Azure RDP virtual machine access with a jumpbox

12 Dec 2018

A jumpbox can be a handy tool to improve security in a Microsoft Azure deployment. For starters, it blocks the public IP address automatically associated with any VMs. Read More