Please turn on your JavaScript for this page to function normally.
eSentire
MDR service essentials: Market trends and what to look for

Mark Sangster, VP and Industry Security Strategist at eSentire, is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors …

network
New infosec products of the week: October 23, 2020

Deepwatch Lens Score: SecOps maturity planning and benchmarking Deepwatch Lens Score allows CISOs to quickly understand data source collection, active analytics, and what …

vault
What is confidential computing? How can you use it?

What is confidential computing? Can it strengthen enterprise security? Nelly Porter, Senior Product Manager, Google Cloud and Sam Lugani, Lead Security PMM, Google Workspace …

Booz Allen Hamilton
New infosec products of the week: October 16, 2020

Cyborg Security launches HUNTR platform to help orgs tackle cyber threats Cyborg Security’s HUNTR platform provides advanced and contextualized threat hunting and detection …

GitHub
GitHub envisions a world with fewer software vulnerabilities

After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …

Apisec
New infosec products of the week: October 9, 2020

Checkmarx provides automated security scans within GitHub repositories Checkmarx announced a new GitHub Action to bring comprehensive, automated static and open source …

data storage
How do I select a data storage solution for my business?

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices. …

Cohesity SiteContinuity
New infosec products of the week: October 2, 2020

Cohesity SiteContinuity: Protecting business-critical apps across a single platform Cohesity SiteContinuity is an automated disaster recovery solution that is integrated with …

hardware security
Hardware security: Emerging attacks and protection mechanisms

Maggie Jauregui’s introduction to hardware security is a fun story: she figured out how to spark, smoke, and permanently disable GFCI (Ground Fault Circuit Interrupter – …

organize
Plan for change but don’t leave security behind

COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …

remote workforce protection
How do I select a remote workforce protection solution for my business?

Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

Qualys Multi-Vector EDR
Qualys Multi-Vector EDR: Protection across the entire threat lifecycle

Traditional endpoint detection and response (EDR) solutions focus only on endpoint activity to detect attacks. As a result, they lack the context to analyze attacks …

Don't miss

Cybersecurity news