Private vs. public cloud security: Benefits and drawbacks

Regardless of whether an enterprise’s infrastructure operates in a private, public or hybrid cloud, cybersecurity is a critical component. While some cloud architectures greatly simplify security tasks and tool... Read more »

How to create a cloud security policy, step by step

By Published: 21 Jan 2021 Organizations using cloud technology to support operations must follow good security practices. Establishing cloud security policies is key to achieving this. In short, a... Read more »

Select a customer IAM architecture to boost business, security

The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have timely access to the resources needed to complete their... Read more »

Extended detection and response tools take EDR to next level

Endpoint detection and response tools protect organizations’ endpoints by monitoring for suspicious behavior and collecting system activities and events. Many are equipped to automatically respond to threats, such as... Read more »

The human firewall’s role in a cybersecurity strategy

Businesses must prioritize cybersecurity now more than ever. This process requires a broader scope than investing heavily in security technologies, however — the tactic most companies have relied on... Read more »

Editor’s picks: Top cybersecurity articles of 2020

Many 2020 cybersecurity predictions were thrown out of orbit when coronavirus cases emerged and COVID-19 was declared a global pandemic by the World Health Organization in March. This year,... Read more »

Endpoint security quiz: Test your knowledge

Konstantin Emelyanov – Fotolia By Today’s security teams are under immense pressure, faced with having to secure the rapid, widespread adoption of IoT in the enterprise. Factor in the... Read more »

How cloud-based SIEM tools benefit SOC teams

By Published: 09 Dec 2020 One of the most prevalent technologies used in security operations centers today is the SIEM platform. However, SOC teams are struggling to adapt on-premises... Read more »

8 benefits of a security operations center

A security operations center, or SOC, is one of the first lines of defense against attacks and breaches. The infosec employees working within this command center create, implement and... Read more »

Jaguar Network Selects NETSCOUT for Virtualized DDoS Defense

NETSCOUT Systems, a leading provider of service assurance, security, and business analytics, today announced that Jaguar Network, a global provider of hosting, network, corporate telephony and cloud services, has... Read more »
Subscribe to our Newsletter