37,210 Results for:

  • Sort by: 

The difference between security assessments and security audits

24 Aug 2017

Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden ... Read More

Essential SQL Server security tools

04 Jan 2013

Read this tip where writer Ashish Kumar Mehta shares his all-time favorite native and third-party SQL Server security tools. Read More

Combatting the top cybersecurity threats with intelligence

22 Dec 2016

Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers... Read More

What new technique does the Osiris banking Trojan use?

20 Feb 2019

A new Kronos banking Trojan variant was found to use process impersonation to bypass defenses. Learn what this evasion technique is and the threat it poses with Nick Lewis. Read More

Third-party application security evaluation tools and services

25 Jul 2014

Learn about the tools and services available that enterprises can use to determine the security of their third-party applications. Read More

Lock down private cloud security with strict procedures, tools

24 Jul 2014

Despite opinions to the contrary, private cloud isn't secure just because it's private. Private cloud security requires a well-thought-out plan and frequent checks to avoid a disaster. Read More

New tool eases enterprise file sync-and-share searches, security

27 Mar 2015

SearchYourCloud's new tool gives users a way to search multiple cloud sync-and-share services on mobile and desktops, with file-level security. Read More

Advanced security analytics safeguards the enterprise

09 Nov 2016

Advanced security analytics uses information gathered from SIEMs and other security tools to safeguard the enterprise. Learn how advanced analytics works and what's coming next. Read More

How desktop virtualization vendors are improving management

06 Feb 2018

IT pros want to see better security and more monitoring capabilities in their virtual desktop management tools. The ultimate goal is a quality user experience, though. Read More

Security Readers' Choice Awards 2014: Threat intelligence tools

11 Nov 2014

Readers vote on the best threat intelligence products of 2014. Read More