IT Security

A Simpler, More Dynamic Way to Manage Endpoints

As workplaces grow larger, networks get more complex and the workforce becomes mobile, IT departments have become responsible for managing

Financial Institutions Protect Themselves with Data Loss Prevention Tools

Companies should be more vigilant and cognizant of their storing practices. One of the best ways companies can do this

Data Classification: Is it the Key to Protecting Personal Data?

A report published by Verizonin April revealed that 89% of business data breaches had a financial or espionage motive. The

Three Effective Ways to Make Application Security Testing a Successful Part of Your DevOps Program

From the latest agile development tools to innovative delivery platforms such as containers, DevOps is changing how people and businesses

7 Critical Criteria for Data Encryption In The Cloud

Encrypting the huge number of data files stored in a public cloud today is like bubble-wrapping an entire house. Better

What is the Difference Between an IPS and a Web Application Firewall?

We are all somewhat familiar with Intrusion Prevention Systems (IPSs). But what is all this talk of Web Application Firewalls

5 ERP Security Risks to Be Aware Of

One of the interesting things about the term ERP is that it is a name that as much describes what

The 5 Essentials of DDoS Mitigation

DISTRIBUTED DENIAL OF Service (DDoS) attacks are a real threat businesses and organizations deal with daily, but this does not

Cisco Adds Advanced Malware Protection to Its Portfolio

“AMPing” up its security capabilities, Cisco integrates technology from its 2013 acquisition of SourceFire into its portfolio. Cisco revealed Feb.

Deploying Application Whitelisting? NIST Has Some Advice For You

If you’re trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National

5 DDoS Attack Prevention Tools to Protect Your Company

DDoS are growing. Designed to take down a website or network infrastructure, they can be volumed based, where a service