IT Security

Endpoint Detection and Response: A New Wave in Security?

Endpoint detection and response, usually abbreviated as EDR, has dominated cybersecurity news feeds over the past few weeks. Palo Alto,

Bitcoin101 – Cryptocurrency Explained

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to

Santander, Ripple Launch First Blockchain Int’l Payment Service For Retail Customers

Spanish-based international bank Santander confirmed the launch of its Ripple-powered Blockchain payment network Thursday, April 12, becoming the first bank

10 Top Mobile Device Management (MDM) Tools & Software

Mobile Device Management (MDM) is an issue for companies that employ wireless devices. Those devices include smartphones and tablets that

Top ERP Security Problems and How to Avoid Them

Securing the data in your Enterprise Resource Planning (ERP) system is crucial for the survival and success of your business.

TrapX Security and Check Point Collaborate To Enhance Enterprise Security

TrapX Security®, the global leader in deception-based advanced cybersecurity defense, is collaborating with Check Point Software Technologies Ltd. (NASDAQ: CHKP)

Why Privileged Account Management Is So Difficult for Enterprises

In a stereotypical scene from the Middle Ages, marauding hordes would lay siege to a castle, braving trebuchets and boiling

Prevoty Cited as The Only Leader in The Runtime Application Self-Protection Market

Prevoty is cited as the leader of runtime application self-protection (RASP) technologies in The Forrester New Wave™: Runtime Application Self-Protection,

How to Find a Cost-Effective Browser Isolation Solution

Last year saw a new wave of high-profile data breaches that reminded us that no industry is safe. The number

When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks

Today, many businesses and corporations are stuck between a legacy antivirus endpoint security solution and the path forward. These solutions

Top 5 Best Data Loss Prevention Software in 2017

We’re collectively creating a massive amount of data on a daily basis. In fact, according to research from tech giant

State of Remote Access Security

Nearly three-quarters of the U.S. workforce will be mobile workers by 2023, IDC predicts. With so many employees on the

Why Security Should Be A Priority For An ERP Ecosystem

In May of this year, organisations across the globe were hit by a malicious ransomware attack that left over 230,000

BeyondTrust Listed by Gartner as a Representative Vendor for Privileged Access Management Four Years in a Row

BeyondTrust, the leading cyber security company dedicated to preventing privilege abuse and stopping unauthorized access, announced that for the fourth

Improving Cyber Defenses using Machine Learning

As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or

UTM (Unified Threat Management) Firewall: Protect Your Business

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic