Chad Kime Avatar
  • Security Data Lakes Emerge to Address SIEM Limitations

    Security Data Lakes Emerge to Address SIEM Limitations

    Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and extended detection and…

  • Security Considerations for Data Lakes

    Security Considerations for Data Lakes

    Many of the basic principles for securing a data lake will be familiar to anyone who has secured a cloud security storage container. Of course, since most commercial data lakes…

  • Best Zero Trust Security Solutions

    Best Zero Trust Security Solutions

    A presidential executive order mandating a zero trust strategy for federal agencies has raised the profile of the cybersecurity technology and prompted many non-government IT security managers to consider how…

  • Zero Trust: Hype vs. Reality

    Zero Trust: Hype vs. Reality

    Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall-perimeter model of cybersecurity equally obsolete. No…

  • IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for decades, yet they remain important…

  • Why You Need to Tune EDR to Secure Your Environment

    Why You Need to Tune EDR to Secure Your Environment

    Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to…

  • MFA Advantages and Weaknesses

    MFA Advantages and Weaknesses

    Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Yet if someone wanted to…

  • APT Attacks & Prevention

    APT Attacks & Prevention

    A company that discovers that an advanced persistent threat (APT) attack is underway tends to be the exception. Attackers design APTs to be subtle, persistent, and to remain undetected for…

  • Data Deletion Methods: What’s Best for Sensitive Data?

    Data Deletion Methods: What’s Best for Sensitive Data?

    Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even…

  • Three Ways to Protect Unfixable Security Risks

    Three Ways to Protect Unfixable Security Risks

    How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive…

Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis