Why VPNs can complement SASE
The pandemic has accelerated the development of better ways to serve and secure remote workers, which make it a good time to reexamine VPNS.
The pandemic has accelerated the development of better ways to serve and secure remote workers, which make it a good time to reexamine VPNS.
Playing the role of an attacker can make your team better at defense if you include all the stakeholders and carefully design goals.
Why developers may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve code security in the future.
Email remains the soft underbelly of enterprise security because it is the most tempting target for hackers. They just need one victim to succumb.
D3FEND is a new schema released by Mitre last month to establish a common language to help cyber defenders share strategies and methods.
Cloud security posture management (CSPM) provides threat intelligence, detection, and remediation for complex cloud environments.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
Server and systems management tools have long been too expensive and too complex to actually use without spending thousands of dollars on consultants. Uptime Software has been trying to change that with a product that can be installed and useful within an hour. We tested the latest version (7.3.1) on a small network of Windows physical and virtual machines.
Peak and Tibbr are two tools that teams can use to help track projects and improve workgroup communications.
Three new services -- Flow, Glip and Slingshot -- try to enhance the ability of teams to converse and collaborate using a variety of tools.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
These four products represent different approaches to VM security
The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990, and has been in daily use, traveling around the world several times and my more-or-less constant work companion. It is a tool not a religion, yet I have been quite fond of the various machines that I have used.
Passwords are a security weak link, but these products help shield passwords from attackers
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK