Data security technology and strategy
In an era when data theft and security breaches are daily occurrences, secure data storage is a key component of a security infrastructure. This introduction to enterprise data security and protection strategies offers advice on how to lock down stored data, data backup and recovery, disk and file encryption and database security.
Top Stories
-
Tip
09 Jan 2023
What is Triple DES and why is it being disallowed?
Triple DES no longer provides the encryption strength it once did. Prepare now to transition away from its use to a more security alternative. Continue Reading
By -
Feature
09 Nov 2021
API security strategies must evolve to include API protection
An API security strategy must include the ability to protect APIs post-deployment, but questions abound about ownership, which tools to use and how to get started. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
27 Oct 2021
5 IT security policy best practices
As businesses and technologies grow and evolve, it's important IT security policies do, too. Follow these five best practices to ensure policies are fresh and relevant. Continue Reading
By- Diana Kelley, SecurityCurve
-
News
08 Oct 2021
Senators want FTC to enforce a federal data security standard
U.S. Senators debated creating federal data privacy and security standards and providing the FTC with enough resources to enforce them. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Feature
14 Sep 2021
Why companies should use AI for fraud management, detection
AI is involved in many cybersecurity processes. Now it's making inroads in fraud management and detection. The benefits, however, are not without AI's nagging bias challenge. Continue Reading
By- Isabella Harford, TechTarget
-
News
27 Aug 2021
App store commission fees scrutinized by South Korea
In this week's antitrust roundup, South Korean officials focus in on Apple and Google app store practices, while U.S. officials meet with tech leadership to discuss cybersecurity. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
24 Aug 2021
electronic discovery (e-discovery or ediscovery)
Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
News
09 Aug 2021
'ProxyShell' Exchange bugs resurface after presentation
A critical vulnerability in Microsoft Exchange is once again making the rounds with attackers, following a Black Hat presentation from the researcher who found it. Continue Reading
-
News
07 Jul 2021
Microsoft posts emergency 'PrintNightmare' patch
The out-of-band patch release addresses a critical flaw that allowed threat actors to gain remote code execution on vulnerable Windows and Windows Server systems. Continue Reading
-
Feature
28 Jun 2021
Organizational resilience questionnaire for recovery teams
Following organizational resiliency standards such as ISO and BSI can prepare organizations for disaster. These questions provide a starting point to validate OR readiness. Continue Reading
By -
Definition
22 Jun 2021
security
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. Continue Reading
By- Madelyn Bacon, TechTarget
- TechTarget Contributor
-
News
16 Jun 2021
Veeam Government Solutions subsidiary features federal focus
Following Veeam's acquisition by Insight Partners, the data protection vendor sought to make gains among U.S. government customers. The unveiling of a subsidiary is the next step. Continue Reading
By- Paul Crocetti, Executive Editor
-
Feature
15 Jun 2021
How to get started with security chaos engineering
Introducing security chaos engineering: the latest methodology security teams can implement to proactively discover vulnerabilities or weaknesses in a company's system. Continue Reading
By -
News
12 May 2021
Funding is key to strengthening national cybersecurity
In the wake of the Colonial Pipeline ransomware attack, national cybersecurity experts make the case for additional funding during a Senate hearing. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Feature
02 Apr 2021
Vaccination data poses data management challenges for firms
If companies are considering the use of vaccination credentials to reopen offices, IT teams should start planning now. Continue Reading
By- Makenzie Holland, Senior News Writer
-
News
25 Mar 2021
Cyber insurance company CNA discloses cyber attack
Though the nature of the cyber attack is unclear, CNA confirmed the attack caused a network disruption and affected systems such as corporate email and the company's website. Continue Reading
By- Arielle Waldman, News Writer
-
Feature
17 Mar 2021
Top incident response tools to boost network protection
Incident response tools can help organizations identify, prevent and respond to malware exploits, ransomware and other targeted cybersecurity attacks. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Tip
20 Nov 2020
Cyber insurance explained, from selection to post-purchase
Before you sign on the dotted line, make sure you understand what cyber insurance can and can't do -- and what type of policy will do the most for you. Continue Reading
By- Sherri Davidoff, LMG Security
-
Tip
16 Nov 2020
7-step pandemic return-to-work IT infrastructure checklist
As employees return on site, ensure your HCI can handle the changes. Follow these steps for checking system hardware and storage, as well as securing software and firmware. Continue Reading
By -
Quiz
09 Nov 2020
Try this cybersecurity quiz, test your cyberdefense smarts
Based on the November 2020 issue of Information Security magazine, this 10-question quiz lets you check your comprehensive knowledge of current security issues and earn CPE credit too. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Opinion
02 Nov 2020
Cybersecurity for remote workers: Lessons from the front
Tackle the security challenges COVID-19 wrought by using this playbook from an experienced disaster-zone responder. Continue Reading
By- Rich Mogull, Securosis
-
Feature
02 Nov 2020
AI in security analytics is the enhancement you need
AI-powered analytics is critical to an effective, proactive security strategy. Learn how AI-enabled tools work and what your organization needs to do to reap their benefits. Continue Reading
- E-Zine 02 Nov 2020
-
News
23 Sep 2020
Cybersecurity for SMB customers evolving into top priority
New research from ConnectWise affirms that MSPs have a fast-growing opportunity to provide cybersecurity for SMB customers. Find out what is fueling the demand. Continue Reading
By- Spencer Smith, Site Editor
-
Feature
03 Aug 2020
Security pros explain how to prevent cyber attacks
Even during pandemics, hackers use malware such as ransomware and phishing to exploit an organization's vulnerabilities. IT security pros discuss how they prevent cyber attacks. Continue Reading
-
Opinion
03 Aug 2020
The case for cybersecurity by design in application software
Security must be part of IT from the start and then continue through the entire product lifecycle -- design, build, release and maintenance. Consumers now demand it. Continue Reading
By -
Feature
31 Jul 2020
Security issues with working remotely (and how to fix them)
With companies continuing work from home for the foreseeable future, Rohit Dhamankar offers home security advice to help security teams and employees address security issues with working remotely. Continue Reading
By- Rohit Dhamankar, Guest Contributor
-
Feature
05 Jun 2020
A case for both cybersecurity detection and prevention tools
Companies need both detection and prevention cybersecurity tools to effectively keep data and employees safe from attackers. Just one or the other isn't enough. Continue Reading
By- Rohit Dhamankar, Guest Contributor
-
Feature
29 May 2020
How security testing could change after COVID-19
As companies look to bring employees back into the office, security teams must consider how to handle security testing due to initial remote work deployments and shadow IT. Continue Reading
By- Mark Whitehead, Guest Contributor
-
News
29 May 2020
Acronis remote backup makes clutch play for Boston Red Sox
For the Boston Red Sox, Acronis remote backup took on enhanced meaning during the coronavirus crisis. Acronis also provides the team with recovery and security capabilities. Continue Reading
By- Paul Crocetti, Executive Editor
-
Feature
26 Mar 2020
Explore 7 data loss prevention tools for utmost security
Explore how DLP products secure enterprise data and these seven specialized vendors that provide protection through varying installation, platforms and features. Continue Reading
By- Kevin Tolly, The Tolly Group
-
News
20 Mar 2020
Databricks bolsters security for data analytics tool
Databricks looks to bridge the gap between on-premises controls and the cloud with data analytics security policies in the company's latest platform update. Continue Reading
-
Tip
11 Mar 2020
Updating the data discovery process in the age of CCPA
Privacy regulations are changing the enterprise data discovery process. Now, automation is key for fulfilling data discovery mandates, including those for CCPA and GDPR. Continue Reading
By -
Feature
17 Feb 2020
Ensure your DR strategy meets the challenges of a new decade
Traditional disasters and new cyberthreats have organizations reexamining their DR plans to ensure they maintain high levels of availability and can restore operations quickly. Continue Reading
By- Nick Cavalancia, Techvangelism
-
News
12 Feb 2020
Data security, IAM led cybersecurity investments in 2019
Vendors specializing in data security, risk and compliance, and IAM raised the most funding in 2019, according to Momentum Cyber, a strategic advisor and investment bank for the cybersecurity industry. Continue Reading
By- Alexander Culafi, Senior News Writer
-
Opinion
03 Feb 2020
2 components of detection and threat intelligence platforms
Deploying threat detection and intelligence platforms is one of the smartest ways to protect your organization's valuable assets. Make sure you know how to choose the best tool. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Infographic
03 Feb 2020
Data breach costs hit hard; where are you most vulnerable?
Breaking down the cost of a data breach isn't for the faint of heart. But with millions of dollars on the line for a single event, companies also need to have their eyes wide open. Continue Reading
-
Opinion
03 Feb 2020
Fresh thinking on cybersecurity threats for 2020
It's a good time to take a clear-eyed view of the likely security threats facing your organization. But then what? Experts suggest getting creative with your threat responses. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
- 03 Feb 2020
- E-Zine 03 Feb 2020
-
Definition
30 Jan 2020
behavior-based security
Behavior-based security software scans for deviations from the norm and decides whether an anomaly poses a threat or can simply be ignored. Continue Reading
-
News
28 Jan 2020
'CacheOut': Researchers unveil new attack on Intel chips
Researchers unveiled a new speculative execution attack that leaks data from most Intel microprocessors and gives attackers greater control over what data is leaked. Continue Reading
By- Rob Wright, Senior News Director
-
Infographic
21 Jan 2020
Compare container security companies for the best protection
Securing containers can be a challenge when faced with buying the right platform. Discover these container security companies and their capabilities in this graphic. Continue Reading
By- Ed Moyle, Drake Software
-
Tip
23 Dec 2019
The top network security trends, threats and strategies in 2020
Ransomware and attacks against cloud providers reflect key network security trends in 2020. To combat these threats preemptively, assess your specific network needs. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
19 Dec 2019
Host IDS vs. network IDS: Which is better?
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective enterprise security. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
10 Dec 2019
Best practices to help CISOs prepare for CCPA
With the CCPA taking effect in 2020, check out security chiefs' best practices to get ahead and stay ahead of impending data privacy and protection compliance regulations. Continue Reading
-
Answer
20 Nov 2019
Comparing Diffie-Hellman vs. RSA key exchange algorithms
See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Continue Reading
By- Sharon Shea, Executive Editor
- Michael Cobb
-
Tip
20 Nov 2019
How to use and manage BitLocker encryption
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
- Tony Bradley, Bradley Strategy Group
-
Opinion
01 Nov 2019
When cyberthreats are nebulous, how can you plan?
Security planning is tough when you're short-staffed and hackers have smart tech too. You'll need solid skills and, most of all, a willingness to use your imagination. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Opinion
01 Nov 2019
CISOs, does your incident response plan cover all the bases?
Security incidents, let's face it, are essentially inevitable. How do you cover the key bases -- education, inventory, and visibility -- in planning for incident response? Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
10 Sep 2019
Cybersecurity and business continuity integration boosts resilience
Are you doing all you can to make your organization resilient? You might be hampering your company's efforts by keeping business continuity and cybersecurity planning separate. Continue Reading
By -
Tip
05 Sep 2019
How blockchain sharding solves the blockchain scalability issue
Sharding is the answer to the scalability problem inherent in blockchain technology. Find out the advantages of sharding and the four problems associated with it. Continue Reading
-
Tip
20 Aug 2019
Network traffic analysis tools secure a new, crucial role
Gartner just produced its first-ever guide to network traffic analytics security tools. Learn how the analysis of network traffic is broadening to include network security. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Conference Coverage
14 Aug 2019
Latest news from the Black Hat 2019 conference
Learn the latest from this year's Black Hat conference, Aug. 3 to 8. Our team is in Las Vegas to report on what's new in information security risks, trends and defense tactics. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
09 Aug 2019
Broadcom-Symantec deal troubles cybersecurity experts
Broadcom laid down a $10.7 billion bet in buying Symantec's enterprise security software. While some are optimistic, security experts predict another Intel-McAfee deal. Continue Reading
By- Ed Scannell, Freelancer
-
Opinion
01 Aug 2019
The must-have skills for cybersecurity aren't what you think
The most critical skills that cybersecurity lacks -- like leadership buy-in, people skills and the ability to communicate -- are not the ones you hear about. That needs to change. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
29 Jul 2019
What are the pros and cons of outsourcing IT security?
Companies are facing increased costs when maintaining an internal security group. Outsourcing IT security has its advantages, but there are some challenges to keep in mind. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
26 Jul 2019
What's the best way to approach multi-cloud security?
Multi-cloud security can be challenging, but new tools promise to ease some of the problems associated with managing resources across multiple CSPs. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
19 Jul 2019
Blockchain terminology: 7 key blockchain storage terms
Storage built around blockchain can be confusing, but understanding basic blockchain storage terminology can help clarify what the technology is and how it works. Continue Reading
By- Stacey Peterson, Senior Managing Editor
-
Feature
28 Jun 2019
Comparing EDR tools: Cybereason vs. CrowdStrike vs. Carbon Black
Learn how tools from leading EDR vendors Cybereason, CrowdStrike and Carbon Black compare when it comes to helping security teams fight endpoint threats and respond to incidents. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
28 Jun 2019
How to retool incident response best practices for the digital age
As companies become more cloud- and mobile-centric, they need to reassess their incident response best practices and automate as much as possible. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
News
22 May 2019
Improved HR security may be why W-2 scams are down
HR's focus on better securing employee data may be working. In its annual data breach investigations report, Verizon found a dramatic decrease in the number of W-2 scam reports. Continue Reading
By- Patrick Thibodeau, Editor at Large
-
Feature
17 May 2019
Patch early, patch often to manage SAP exploit
In this Q&A, Onapsis CEO Mariano Nunez and SAP security head Tim McKnight discuss the recent SAP security system threat and what companies can do to protect systems and data. Continue Reading
By- Jim O'Donnell, News Writer
-
Feature
16 May 2019
Words to go: GPS tracking security
GPS and location-based services may be some of the most significant recent technological advancements, but they can also put personal privacy in jeopardy. Continue Reading
By- Katie Donegan, Social Media Manager
-
News
13 May 2019
Acronis data protection gives Red Sox an edge in backup
Acronis has stepped up to the plate for the Boston Red Sox. The 2018 World Series champions will use Acronis products for backup, recovery, transfer and remote data accessibility. Continue Reading
By- Paul Crocetti, Executive Editor
-
Opinion
01 May 2019
Putting cybersecurity for healthcare on solid footing
CISO Kevin Charest talks security threats he sees in the healthcare field and the means his company is using to thwart them, including HCSC's Cyber Fusion Center. Continue Reading
- E-Zine 01 May 2019
-
News
15 Apr 2019
New programs released aim to improve Google Cloud security
With the release of programs like Access Transparency, Virtual Private Cloud and GKE Sandbox, Google aims to improve Google Cloud security and identity protection. Continue Reading
-
Tip
20 Mar 2019
How automated patch management using SOAR can slash risk
Learn how to use security orchestration, automation and response, also known as SOAR, to ease the hassle of mundane tasks related to patch management. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
20 Mar 2019
Automating incident response with security orchestration
Security orchestration, automation and response technology is now seen as a key aid to security pros attempting to thwart an onslaught of cyberattacks. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
20 Mar 2019
Plugging the cybersecurity skills gap with security automation
Security automation and response promises to help alleviate the shortage of qualified cybersecurity pros. Learn how SOAR helps security teams work smarter, not harder. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Feature
14 Mar 2019
AI security tech is making waves in incident response
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense. Continue Reading
-
Conference Coverage
07 Mar 2019
RSAC 2019: Coverage of the premiere security gathering
Find out what's happening at the at the 2019 RSA Conference in San Francisco, the information security industry's biggest event, with breaking news and analysis by the SearchSecurity team. Continue Reading
By- Madelyn Bacon, TechTarget
-
Tip
05 Mar 2019
How blockchain storage could benefit the enterprise
Whether your organization is a potential buyer or seller of blockchain data storage, the technology could change how you look at storage. Discover where blockchain is headed. Continue Reading
-
Tip
27 Feb 2019
Secure disaster recovery will be a priority in 2019
Along with weather events and IT outages, data security has become a major concern in DR. With cyberattacks on the rise, strategists are placing higher importance on resilience. Continue Reading
By- Nick Cavalancia, Techvangelism
-
Tip
20 Feb 2019
Key steps to put your zero-trust security plan into action
There are three key categories of vendor zero-trust products. Learn what they are, and how to evaluate and implement the one that's best for your company. Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
12 Feb 2019
Carbonite acquisition of Webroot merges backup, cybersecurity
The Carbonite acquisition of Webroot is a big play in the SMB market. Carbonite's backup and recovery platform will combine with Webroot's cybersecurity. Continue Reading
By- Paul Crocetti, Executive Editor
-
Feature
01 Feb 2019
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations. Continue Reading
-
Feature
01 Feb 2019
Top 10 CISO concerns for 2019 span a wide range of issues
From dealing with data and staffing shortages to adapting to an ever-expanding set of job responsibilities, CISOs face an array of serious issues in 2019. Continue Reading
-
Infographic
01 Feb 2019
Cutting SecOps breach response time is key to success
A new survey measures the success of security operations breach response by how long it takes to complete a three-step process to detect, understand and contain incidents. Continue Reading
By- Kate Gerwig, Editorial Director
-
Tip
30 Jan 2019
How to ensure a secure disaster recovery operation
As if recovering from a disaster isn't pressing enough, organizations also need to be mindful of potential security breaches when they are most vulnerable. Continue Reading
By -
Tip
10 Jan 2019
6 steps to how blockchain storage works
See how blockchain technology has the potential to provide a secure and reliable enterprise data storage environment with our step-by-step guide to blockchain data storage. Continue Reading
-
Tip
20 Nov 2018
Zero-trust security means new thinking plus practical steps
Implementing a security policy that, essentially, trusts no one and nothing doesn't have to be overwhelming if you understand the basics behind the security model. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
News
20 Nov 2018
AWS moves to curb S3 data leaks, but Chris Vickery is doubtful
Amazon unveils new settings to help users avoid S3 data leaks, but UpGuard's Chris Vickery, who uncovered most AWS exposures, is doubtful the changes will end the problem. Continue Reading
By- Michael Heller, TechTarget
-
Tip
21 Sep 2018
4 tips on getting up to speed with GDPR for U.S. companies
When GDPR went into effect four months ago, some U.S. companies just shut down communications with EU customers, but compliance can benefit organizations and marketers. Continue Reading
-
Tip
10 Jul 2018
How to ensure hyper-converged infrastructure security
To secure data in an HCI system, it requires tools and techniques that account for the unique features of hyper-convergence, such as shared resources and virtualized management. Continue Reading
-
Answer
26 Jun 2018
How do I keep my virtualized backup secure?
A virtual backup is not effective if it's not secure. Encryption, agentless backup and testing can all help. Explore the details of how to secure your backups. Continue Reading
By -
Podcast
17 May 2018
Risk & Repeat: Why Ray Ozzie's Clear proposal isn't so clear
In this week's Risk & Repeat podcast, SearchSecurity editors discuss Ray Ozzie's solution for going dark, known as Clear, and what infosec experts are saying about it. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
23 Apr 2018
Spectre and Meltdown vulnerabilities show haste makes waste
When the Meltdown and Spectre vulnerabilities came to light, everyone scrambled to find a fix. As a result, the patching process has been anything but smooth. Continue Reading
By -
News
06 Apr 2018
Misconfigured cloud storage leaves 1.5B files exposed
Researchers found misconfigured cloud storage across multiple platforms left huge amounts of data exposed, including medical information and payroll data. Continue Reading
By- Michael Heller, TechTarget
-
Tip
06 Apr 2018
Zero-trust model promises increased security, decreased risk
The zero-trust model takes focused and sustained effort, but promises to improve most companies' risk posture. Learn what it takes to get the most out of zero trust. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
11 Jan 2018
Guard the line with Windows Defender features
The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, including Application Guard and Exploit Guard. Continue Reading
By -
Answer
26 Dec 2017
What is emotional data and what are the related privacy risks?
SearchSecurity talks with UC Berkeley professor Steven Weber about the concept of emotional data, where it comes from and how it can potentially be used -- and abused. Continue Reading
By- Rob Wright, Senior News Director
-
Opinion
02 Oct 2017
No customer data leaks? Companies look down the rabbit hole
When Yahoo finally disclosed a massive 2014 data breach to up to five hundred million affected account holders in September 2016, some already had legal representation. Continue Reading
-
Feature
15 Sep 2017
Symantec Data Loss Prevention: Product overview
Expert Bill Hayes checks out the Symantec Data Loss Prevention suite, featuring an architecture consisting of content-aware detection servers, endpoint agents and unified management. Continue Reading
By -
Guide
21 Jul 2017
What data loss prevention systems and tactics can do now
Setting up systems to preventing data loss is a must for companies of all sizes. Learn the basics of and what's new in data loss prevention and how to keep your DLP system humming. Continue Reading
-
Tip
20 Jul 2017
Tools to transfer large files: How to find and buy the best
Need to transfer files within headquarters or between branches? Managed file transfer tools now offer some interesting new features. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
News
14 Jul 2017
AWS S3 bucket leak exposes millions of Verizon customers' data
News roundup: An AWS S3 bucket leak containing personal data of millions of Verizon customers was exposed to the public. Plus, DNC hack victims are suing the Trump campaign, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Tip
11 Jul 2017
Tactics for security threat analysis tools and better protection
Threat analysis tools need to be in top form to counter a deluge of deadly security issues. Here are tips for getting the most from your analytics tool. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
E-Zine
10 Jul 2017
The best endpoint security practices are evolving and essential
Ever since the first mobile device hit the enterprise network, best endpoint security practices have been a major IT concern. What's happened since then has been a staggering proliferation of the number and types of devices on the network, complicated by increasing numbers of mobile and remote corporate employees, all of which have essentially ended the traditional idea of a corporate network security perimeter. Firewalls and other more traditional security appliances may still be in use, and rightly so, but endpoint security management is more critical than ever in keeping enterprise systems and data safe from malicious actors.
The summer Insider Edition, our Information Security magazine quarterly e-zine, looks at what's new in endpoint security management, from the best endpoint security tools to consider now, and what other efforts beyond tools infosec pros can employ to best secure all those pesky mobile endpoints wandering in and out of corporate corridors.
This Insider Edition offers expert assessments on the endpoint security technology vendors have developed to combat mutating ransomware like WannaCry -- from machine learning to multivendor partnerships to behavior analytics. Also included is an exploration of mobile endpoint security tools like application containers and app wrapping. CISOs must focus now on how the threats, and the technological advances to fight them, are changing and factor these considerations into any endpoint security strategy.
Readers will come away with a deeper understanding of the best endpoint security tools and techniques available and be able to consider the most advanced approaches available to locking down the company data and systems that endpoints can access.
Continue Reading -
Feature
10 Jul 2017
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints. Continue Reading
By- David Geer, Geer Communications
-
Opinion
10 Jul 2017
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor