Endpoint Protection

Endpoint Protection and Security

When SD-WAN is more than SD-WAN

SD-WAN has the potential to offer much more than a more manageable network using any choice of connectivity. Is security the next big opportunity for SD-WAN?

cybersecurity

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.

WannaCry makes me want to cry!

Some random thoughts on the causes and ramifications of the WannaCry ransomware attack—the biggest cybersecurity incident in years

SIEM remains an enterprise security architecture requirement

Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners.

The rise of enterprise-class cybersecurity vendors

Cybersecurity professionals say enterprise-class cybersecurity vendors must offer industry experience, support for IT initiatives and a commitment to streamline security operations.

biometrics

It’s World Password Day but passwords may be headed for extinction

A range of alternative authentication methods could spell end for passwords

The move toward enterprise security technology integration

Enterprises want best-of-breed security technology and integration. They'd buy from enterprise-class cybersecurity vendors—if they knew who they were.

Enterprise security technology consolidation

Large organizations are consolidating the number of security vendors they do business with and buying products built for integration.

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage demands that new cybersecurity technologies must be built for ease of deployment, ease of use, and rapid ROI.

Cybersecurity skills shortage threatens the mid-market

Organizations with 100 to 999 employees remain understaffed and under-skilled in cybersecurity—and an easy mark for hackers.

Cybersecurity remains an elusive business priority

Most organizations are increasing cybersecurity spending and elevating cybersecurity issues to the board level but still struggle with the cybersecurity skills shortage.

SOAPA services opportunities abound

Similar to the rise of ERP in the 1990s, we are about to see a cybersecurity services boom around Security Operations and Analytics (SOAPA).

cybersecurity

Security researcher blasts Tizen: 'May be the worst code I've ever seen'

Israeli security researcher criticizes Tizen, a Samsung-backed Android alternative, for its many security flaws.

key metal home security encryption

Can Google’s Key Transparency make encrypted email ubiquitous?

The open nature of email makes implementing encryption complex. Google hopes to change that with its Key Transparency initiative.

08 firewall

Face-off: Cisco vs. Fortinet for enterprise firewalls

Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products.

spearfishing trap

7 steps to avoid getting hooked by phishing scams

Here are seven simple steps that will safeguard you and your business from phishing attacks.

People, process and technology challenges with security operations

Large organizations need to focus on formalizing processes, implementing intelligent security technologies, training staff and modifying the organization.

The 'new' McAfee

Security veteran McAfee has ample opportunity to prosper again with the right investment and focus.

7 encryption

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

Load More