37,210 Results for:

  • Sort by: 

How to identify and manage cloud security misconfigurations

01 Aug 2018

Identifying cloud security misconfigurations and decreasing the potential impact doesn't have to be complicated. Expert Ed Moyle outlines the tools and resources needed. Read More

Rely on cloud security policy -- not tools -- to protect AWS

23 Dec 2015

AWS boosted its security management offerings at re:Invent, but the cloud provider's shared responsibility model means developers must be attentive and implement policies. Read More

Words to go: Azure cloud security services

14 Nov 2017

Cloud security is a high priority for enterprises, but the range of services can be overwhelming. For Azure users, here's a quick cheat sheet of must-know security tools. Read More

McAfee Database Activity Monitoring: Database security tool overview

25 Oct 2015

Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Read More

Introduction to security analytics tools in the enterprise

23 Mar 2015

Expert Dan Sullivan explains how security analysis and analytics tools work, and how they provide enterprises with valuable information about impending attacks or threats. Read More

Microsoft Teams app takes aim at vertical markets

24 Sep 2018

Microsoft is adding secure messaging tools for healthcare workers and a schedule management system to the Microsoft Teams app, which is now used by 329,000 organizations worldwide. Read More

Third-party security monitoring tools abet Exchange flaws

03 Sep 2015

Don't let the deficiencies from applying and managing Exchange threaten your network. Implement third-party security tools to thwart breaches. Read More

Four pen testing tools for improving midmarket security

24 Nov 2015

The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies. Read More

Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool

30 Oct 2015

Expert Michael Cobb details the changes in SHA-3, including how it differs from its predecessors and the additional security it offers, and what steps enterprises should take. Read More

Are your virtualization security tools up to the job?

03 Dec 2014

Many organizations are lagging in assessment of security in their virtual environments. Updated tools and procedures can help address those gaps. Read More