Select a customer IAM architecture to boost business, security

The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have timely access to the resources needed to complete their... Read more »

Extended detection and response tools take EDR to next level

Endpoint detection and response tools protect organizations’ endpoints by monitoring for suspicious behavior and collecting system activities and events. Many are equipped to automatically respond to threats, such as... Read more »

The human firewall’s role in a cybersecurity strategy

Businesses must prioritize cybersecurity now more than ever. This process requires a broader scope than investing heavily in security technologies, however — the tactic most companies have relied on... Read more »

Editor’s picks: Top cybersecurity articles of 2020

Many 2020 cybersecurity predictions were thrown out of orbit when coronavirus cases emerged and COVID-19 was declared a global pandemic by the World Health Organization in March. This year,... Read more »

Endpoint security quiz: Test your knowledge

Konstantin Emelyanov – Fotolia By Today’s security teams are under immense pressure, faced with having to secure the rapid, widespread adoption of IoT in the enterprise. Factor in the... Read more »

How cloud-based SIEM tools benefit SOC teams

By Published: 09 Dec 2020 One of the most prevalent technologies used in security operations centers today is the SIEM platform. However, SOC teams are struggling to adapt on-premises... Read more »

8 benefits of a security operations center

A security operations center, or SOC, is one of the first lines of defense against attacks and breaches. The infosec employees working within this command center create, implement and... Read more »

Jaguar Network Selects NETSCOUT for Virtualized DDoS Defense

NETSCOUT Systems, a leading provider of service assurance, security, and business analytics, today announced that Jaguar Network, a global provider of hosting, network, corporate telephony and cloud services, has... Read more »

Data protection impact assessment tips and templates

Read more »

Security pros fear prosecution under outdated UK laws

Read more »
Subscribe to our Newsletter