Benefits of DNS Service Locality
Commentary | 10/24/2018 | Operating one's own local DNS resolution servers is one of the simplest and lowest-cost things an IT administrator can do to monitor and protect applications, services, and users from potential risks.
The Browser Is the New Endpoint
Commentary | 10/23/2018 | Given the role browsers play in accessing enterprise applications and information, it's time to rethink how we classify, manage, and secure them.
Enterprises Face a Large, & Growing, Cybersecurity Skills Gap
News Analysis-Security Now | 10/23/2018 | As enterprise cybersecurity becomes complex and businesses scramble to invest more in their defenses, there's a shortage of workers with the right set of skills that businesses need. Is it possible to overcome this particular gap?
2018 State of Cyber Workforce
Slideshows | 10/22/2018 | Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.
Understanding SOCs' 4 Top Deficiencies
Commentary | 10/22/2018 | In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.
New Security Woes for Popular IoT Protocols
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
Audits: The Missing Layer in Cybersecurity
Commentary | 10/18/2018 | Involving the audit team ensures that technology solutions are not just sitting on the shelf or being underutilized to strategically address security risks.
|