Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
- Risk & Repeat: When will mobile voting be ready?- This week's Risk & Repeat podcast examines the rise of mobile voting apps and how security experts have expressed concerns about the risks deploying the technology for elections. Continue Reading 
- CCSK cert guide author's insights into cloud security credential- The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading 
- Comparing single cloud vs. multi-cloud security challenges- A multi-cloud environment is not inherently more secure than a single cloud. Learn how to choose between single cloud vs. multi-cloud for your organization from a security perspective. Continue Reading 
- 
						
- Compare the top cloud-based IoT security platforms to protect devices- IoT security tools can protect widely used computing devices that pose cybersecurity risks in the current remote work era. Explore the leading cloud-based options here. Continue Reading 
- How data loss prevention strategies benefit from UBA- Data loss prevention strategies require unique insight into user activity. Can user behavior analytics capabilities benefit threat management and breach detection? Continue Reading 
- How can security benefit from cyberthreat intelligence?- Cyberthreat intelligence is essential to understand common external-facing risks. Learn how to find the right threat intelligence feed and how the data can benefit cybersecurity.Continue Reading 
- Why developers need to know the Spring Security framework- The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities.Continue Reading 
- Utilize SMB security tools to work from home safely- With the global pandemic forcing enterprise workers home, SMB security tools can provide necessary protection for newly built home offices in order to keep business moving.Continue Reading 
- Bot management drives ethical data use, curbs image scraping- Bot management tools can help enterprises combat bad bots, prevent web and image scraping, and ensure ethical data use -- all while maintaining a positive end-user experience.Continue Reading 
- AI pen testing promises, delivers both speed and accuracy- AI is making many essential cybersecurity tasks more effective and efficient. AI-enabled penetration testing, or BAS, technologies are a case in point.Continue Reading 
- 
						
- SASE identity policies enhance security and access control- Will the Secure Access Service Edge model be the next big thing in network security? Learn how SASE's expanded definition of identity is fundamental to this emerging access model.Continue Reading 
- 4 essential AI-enabled security concerns for buyers and vendors- Experts offer four concerns for enterprises and vendors to discuss in order to deploy and run AI-based cybersecurity tools.Continue Reading 
- Will nonprofit's evolution of zero trust secure consumer data?- An Australian nonprofit aims to deliver an improved security protocol through what it calls a 'true zero-trust custody layer.' Will the protocol improve consumer data protection?Continue Reading 
- AI Security Alliance urges clarity for buying AI security tools- Vendors and customers must be aware of potential gaps between expectations and reality in the sale or purchase of AI cybersecurity products, an AI security expert advises.Continue Reading 
- Analyzing the top 2019 data breach disclosures: Hindsight in 2020- Make 2020 the year your company keep its resolution to avoid a data breach. Experts offer lessons learned from the top 2019 data breaches to help stay secure in the year ahead.Continue Reading 
- The future of facial recognition after the Clearview AI data breach- The company that controversially scrapes data from social media sites for law enforcement clients announced a data breach. What does it mean for the future of facial recognition?Continue Reading 
- 5G network slicing security benefits IoT, mobile- The fifth generation of mobile cellular technology offers a unique benefit its predecessors don't: network slicing. Learn more about these virtual slices and their security benefits.Continue Reading 
- Cyberinsurance coverage reflects a changing threat landscape- A constant deluge of data breach disclosures has prompted an increase in cybersecurity insurance coverage adoption. Learn how a policy can enhance an enterprise risk management program.Continue Reading 
- Good cybersecurity thesis topics for a master's degree- Writing a master's thesis? A strong topic positions you for academic and professional success, while a weak one promises to make an already intensive process arduous at best.Continue Reading 
- Who wins the security vs. privacy debate in the age of AI?- When trying to maintain balance between security and privacy in an AI-enabled world, who decides which side should tip and when? So continues the security vs. privacy debate.Continue Reading 
- Fighting PCI non-compliance could require new frameworks, zero trust- Falling PCI DSS compliance rates could force the PCI Security Standards Council to be more open to other regulatory frameworks and make enterprises aim higher in terms of data security. Could zero trust be part of the solution?Continue Reading 
- Benefits of cloud data discovery tools and services multiply- With multi-cloud and privacy regulations becoming the new normal, infosec teams need data discovery tools and services to keep up. Learn more about available cloud options.Continue Reading 
- Risk & Repeat: More McAfee executives depart- This week's Risk & Repeat podcast discusses the revelation that more executives have left McAfee amid the unexpected departure of longtime CEO Chris Young last month.Continue Reading 
- Risk & Repeat: 2019 data breaches in review- This week's Risk & Repeat podcast looks at some of the biggest data breach disclosures from the second half of 2019 and discusses the trends around these incidents.Continue Reading 
- 2 components of detection and threat intelligence platforms- Deploying threat detection and intelligence platforms is one of the smartest ways to protect your organization's valuable assets. Make sure you know how to choose the best tool.Continue Reading 
- Cisco CISO says today's enterprise must take chances- Cisco CISO Steve Martino talks about taking chances, threats, how the security leader's role is changing and what really works when it comes to keeping the company secure.Continue Reading 
- Can IDaaS adoption improve enterprise security posture?- Experts suggest enterprises consider identity as a service as organizations' data management needs grow and access management becomes more complex.Continue Reading 
- Compare container security companies for the best protection- Securing containers can be a challenge when faced with buying the right platform. Discover these container security companies and their capabilities in this graphic.Continue Reading 
- Lyft's open source asset tracking tool simplifies security- Security teams need information and context about data in order to keep it safe. Learn how Cartography, Lyft's open source asset tracking tool, creates highly comprehensive maps.Continue Reading 
- Top 10 cybersecurity predictions: 2020 edition- When it comes to cybersecurity predictions, in many ways, 2020 is a continuation of the present. Emerging trends include nation-state activity, IoT infrastructure attacks and more.Continue Reading 
- AI and machine learning in cybersecurity: Trends to watch- AI and machine learning in cybersecurity are not so much useful to security teams today as they are necessary. Examine cybersecurity automation trends and benefits.Continue Reading 
- Editor's picks: Most pressing cybersecurity stories in 2019- As the year comes to an end, SearchSecurity takes a bird's-eye view of the sophisticated cyberthreat landscape and how it has changed over the past 12 months.Continue Reading 
- Host IDS vs. network IDS: Which is better?- Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective enterprise security.Continue Reading 
- Google expands multiple Chrome password protection features- Chrome's updated, built-in protections are intended to help users protect their passwords and data against malware, data breaches and phishing sites, according to the company.Continue Reading 
- Role of AI in cybersecurity and 6 possible product options- Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them.Continue Reading 
- As cybersecurity insurance coverage becomes common, buyer beware- Cybersecurity insurance coverage can certainly have its benefits after a breach, but companies must consider a variety of unique business factors before choosing a policy.Continue Reading 
- Designing the future of cyber threat intelligence sharing- Attendees at the ACSC conference strategized about what ideal threat intelligence sharing looks like. Learn more about the future of collaborative cyberdefense.Continue Reading 
- Boost network security visibility with these 4 technologies- The network is where it's at if you want to stop malicious actors. But first you need to up your network visibility. Learn about four technologies that can help.Continue Reading 
- Network visibility and monitoring tools now amp up security- Three technology trends are currently making network visibility even more central to security tools. Learn more about the impact of big data, AI and APIs.Continue Reading 
- Benefits of using Azure Security Center for security assessments- Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches.Continue Reading 
- How container adoption affects container security- Scalability and efficiency make container adoption an attractive option for enterprises today. Learn how containerization has evolved and grown since the release of Docker 1.0 five years ago.Continue Reading 
- How the future of data privacy regulation is spurring change- Some companies have taken steps to improve data governance in anticipation of data privacy rules. Experts discuss the challenges of compliance in a shifting regulatory landscape.Continue Reading 
- 5 cloud storage privacy questions to ask potential providers- Data confidentiality in cloud computing is a major enterprise concern, yet providers are often lacking in their details. Here are the questions to ask before adopting a service.Continue Reading 
- On a penetration tester career path, flexibility and curiosity are key- Becoming a pen tester takes more than passing an exam. Learn the qualities ethical hackers should embrace to achieve success on their penetration tester career path.Continue Reading 
- Is a cybersecurity insurance policy a worthy investment?- Variables such as third-party business partners create unique cyberthreats for organizations. Find out when a cybersecurity insurance policy is a wise investment to prevent risk.Continue Reading 
- How should I choose a cybersecurity insurance provider?- To vet potential cybersecurity insurance providers, there are a few questions every customer should ask. Learn more about the questions to ask and how to get the answers you need.Continue Reading 
- Essential instruments for a pen test toolkit- Does your penetration testing toolkit have the proper contents? Learn the must-have tool for any pen tester, as well as specific tools for wireless, network and web app pen testing.Continue Reading 
- How security teams benefit from traffic mirroring in the cloud- Enterprises with the resources to deploy traffic mirroring are gaining security benefits. Frank Siemons explains how traffic mirroring has adapted to new and evolving cyber-risks.Continue Reading 
- Should I invest in attack simulation tools?- Attack simulation tools -- along with third-party penetration testing -- can help improve an organization's enterprise security. Find out why.Continue Reading 
- Do network layer and application layer DDoS attacks differ?- Network layer and application layer DDoS attacks are significant threats. Learn about the differences between them and what you can do to reduce their effects.Continue Reading 
- How software-defined perimeter authentication ups security- Find out how the emerging software-defined perimeter model increases security by its design and how it can serve as a building block to zero-trust security.Continue Reading 
- Designing IoT security: Experts warn against cutting corners- Security, though costly, is essential for IoT devices; a single breach can destroy a company's reputation. IoT security by design can avoid devastating incidents.Continue Reading 
- Gigamon launches platform to improve application visibility- Application Metadata Intelligence identifies network performance, application performance, operational technology communications and security and threat detection.Continue Reading 
- Why CASB tools are crucial to your cloud security- CASB tools have gained traction as cloud security becomes more important. Among other features, a cloud security access broker helps companies pinpoint shadow IT.Continue Reading 
- Complexity requires new cloud-based patch management strategies- Patch management for cloud creates new challenges than traditional in-house programs. Expert Dave Shackleford presents patch management best practices for providers and consumers alike.Continue Reading 
- The difference between zero-day vulnerability and zero-day exploit- A zero-day vulnerability isn't the same as a zero-day exploit. Learn the difference between these two zero-day terms, as well as why they should be high priority on any CISO's patching list.Continue Reading 
- DevOps security checklist requires proper integration- There are a lot of moving parts to adding security into a DevOps environment. Using application testing DevOps security tools are key to the equation.Continue Reading 
- How to identify and evaluate cybersecurity frameworks- Not all frameworks for cybersecurity are equal. ESG's Jon Oltsik explains what attributes make a cybersecurity framework and how to go about choosing and using one.Continue Reading 
- 4 necessary steps to evaluate public cloud security- The Capital One hack raised questions about public cloud security. Take these four steps to ensure your data is protected.Continue Reading 
- 5 email security appliance comparison criteria to consider- Identifying the best email security appliance on the market can be hard. This article discusses the criteria to consider when choosing one for your organization.Continue Reading 
- Why is third-party risk management essential to cybersecurity?- Attackers know third parties hold many of the keys to the enterprise network, so third-party risk management is crucial for security professionals.Continue Reading 
- What secure email gateways can do for your enterprise- Discover email security gateways in this buyer's guide that outlines architecture, cost and uses of email security products.Continue Reading 
- Digital transformation redefines cybersecurity skills, careers- The move toward digital business processes has forced companies to reconsider how they find cybersecurity talent, but finding the right skills may be easier than CISOs think.Continue Reading 
- How to pass the CISSP exam on your first try: Tips to get a good score- Want to become a CISSP? Here's everything you need to know, such as how difficult the exam is, tips for studying, what's needed to obtain a passing score and more.Continue Reading 
- SD-WAN security benefits go beyond the obvious- SD-WAN does more than extend corporate networks. Key SD-WAN security benefits that capitalize on the technique's architecture could change the face of SD-WAN in the enterprise.Continue Reading 
- What are the pros and cons of outsourcing IT security?- Companies are facing increased costs when maintaining an internal security group. Outsourcing IT security has its advantages, but there are some challenges to keep in mind.Continue Reading 
- Quantum computers mean cryptography needs to change, and soon- As quantum computing gains momentum with practical quantum computers due to come online as early as next year, concerns about post-quantum cryptography are pushed to the forefront.Continue Reading 
- 5 best practices to choose the right email security software- Examine the five best practices and most important criteria for evaluating email security software products and deploying them in your enterprise.Continue Reading 
- The benefits of IAM can far outweigh the costs- Identity and access management is a critical piece of enterprise information security. But the benefits of IAM go beyond illuminating who -- and what -- might be using your network.Continue Reading 
- Cisco engineer: Why we need more women in cybersecurity- Progress on the cybersecurity gender gap has been slow but steadier recently. Cisco engineer Michele Guel explains how to hack the gender gap.Continue Reading 
- Who's to blame for ransomware attacks -- beyond the attackers?- Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops.Continue Reading 
- Do I need to adopt a cybersecurity framework?- A comprehensive cybersecurity framework can help businesses avoid costly attacks. But there are other advantages.Continue Reading 
- How to beef up Office 365 email security features- Companies looking to fortify their Office 365 email security can assess options from a variety of third-party vendors. Find out which features are the most important.Continue Reading 
- Comparing EDR tools: Cybereason vs. CrowdStrike vs. Carbon Black- Learn how tools from leading EDR vendors Cybereason, CrowdStrike and Carbon Black compare when it comes to helping security teams fight endpoint threats and respond to incidents.Continue Reading 
- What identity governance tools can do for your organization- Learn how to evaluate available security tools that manage the governance of your users' identity and access to company systems and data.Continue Reading 
- SANS security awareness credential paves new career path- The SANS Security Awareness Professional credential gives enterprises a new method to recognize and promote cybersecurity awareness in the organization.Continue Reading 
- Zero-trust security model means more than freedom from doubt- A zero-trust security model has a catchy name, but the methodology means more than not trusting any person or device on the network. What you need to know.Continue Reading 
- Why are fewer companies using SMS 2FA for authentication?- Instead of SMS two-factor authentication, some companies are switching to 2FA through messaging apps and social media platforms. Learn what's behind this authentication trend.Continue Reading 
- Explore this NGFW comparison of leading vendors on the market- Explore some of the top NGFWs currently on the market -- based on features and user reviews -- to help you make a buying decisionContinue Reading 
- How to select and implement a next-gen firewall- This buyer's guide examines next-generation firewalls and how to select the correct one for your organization based on comparison of product features.Continue Reading 
- What makes BSA's secure software development framework unique?- BSA rolled out a new secure software development framework in an effort to promote best practices for secure software development and improve security for all.Continue Reading 
- 6 firewall selection criteria to purchase NGFWs- These six key factors will help your company determine the best NGFW product for your organization's needs.Continue Reading 
- How does an identity and access management framework work?- A comprehensive identity and access management framework is an IT necessity. But how do the two components work together?Continue Reading 
- Why centralization in a multi-cloud security strategy is key- When moving to a multi-cloud infrastructure, there are a few strategies to keep in mind. Learn how centralization will limit the challenges of fragmented security access and monitor controls.Continue Reading 
- Next-generation firewall comparison based on company needs- Compare leading next-generation firewalls to help find the option that best fits your IT environment and security needs.Continue Reading 
- Next-generation firewalls vs. traditional and UTMs- Learn the advantages of next-generation firewalls that protect enterprise networks from attacks and intrusion, as well as the differences between NGFWs and traditional firewalls.Continue Reading 
- How information sharing can reduce cybersecurity vulnerabilities- Cybersecurity vulnerabilities come from multiple fronts for modern businesses, but information sharing about real-world breaches -- good and bad -- provides valuable intelligence.Continue Reading 
- 10 endpoint security products to protect your business- Check out this product roundup and discover all the features endpoint security protection offers, such as patch management, email protection and reporting.Continue Reading 
- Challenges and benefits of using the Mitre ATT&CK framework- Taking the first step might be the biggest hurdle to using the Mitre ATT&CK cybersecurity framework. Find out more about the benefits, challenges and how to get started.Continue Reading 
- Top 5 reasons for a zero-trust approach to network security- As network perimeters disintegrate and enterprises adopt cloud computing, discover the top reasons organizations are opting for a zero-trust approach to network security.Continue Reading 
- Assess secure web gateways to suit your network security needs- Secure web gateways play an important role in minimizing security risks associated with website vulnerabilities, user behaviors and endpoint weaknesses.Continue Reading 
- Assess endpoint security tools to fulfill organizational needs- Learn about the evolution of endpoint security tools, and how to procure and buy the right antimalware protection products for your organization.Continue Reading 
- Symantec Web Security Service vs. Zscaler Internet Access- Learn how cloud-based secure web gateway products Symantec Web Security Service and Zscaler Internet Access compare when it comes to features, benefits, pricing and support.Continue Reading 
- 6 questions to ask before evaluating secure web gateways- Learn which six questions can help an organization identify its web security and business needs and its readiness to implement a secure web gateway.Continue Reading 
- Can PDF digital signatures be trusted?- Digital signatures on PDF documents don't necessarily guarantee their contents are valid, as new research shows viewer implementations don't always detect incomplete signatures.Continue Reading 
- Zero-trust security model primer: What, why and how- What exactly is a zero-trust security model? This primer explains the basics about the philosophy behind how designing a security architecture strictly limits access to all, not just outsiders.Continue Reading 
- How can I detect fileless malware attacks?- Monitoring process memory is one way to combat fileless malware attacks. Here's what you can do to protect your network against these campaigns.Continue Reading 
- Who needs security orchestration, automation and response?- Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Learn how SOAR tools free up security pros to tackle the more demanding projects.Continue Reading 
- Plugging the cybersecurity skills gap with security automation- Security automation and response promises to help alleviate the shortage of qualified cybersecurity pros. Learn how SOAR helps security teams work smarter, not harder.Continue Reading 
- An introduction to building management system vulnerabilities- Understanding what a building management system is and does is important for organizations to have stronger security postures. Expert Ernie Hayden examines the BMS and its flaws.Continue Reading