User and entity behavior analytics (UEBA) is a valuable tool for detecting signs of malicious activity within your network. UEBA monitors the activities of users and entities (such as hardware…
The enterprise use of APIs (application programming interfaces) is exploding, as more and more businesses embark on digital transformation and look for ways to make money by exposing their data…
Privileged accounts pose a serious security problem. Anyone who has access to one has the potential to use those administrative privileges to harm your organization in a number of ways,…
A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. See our picks…
In a SQL injection attack, an attacker submits to a website information that has been deliberately formulated in such a way that it results in that website misinterpreting it and…
CVE-2017-5638 is the code vulnerability that will long live in the corporate memory of Equifax, the credit ratings agency. A simple patch management system might have kept that vulnerability from…
The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service…
Many business leaders had been unaware of the severity of the ransomware problem until the WannaCry attacks in mid-2017 raised its profile significantly. In fact, ransomware has been around…
See our complete list of Top CASB Vendors. Company information Forcepoint (formerly Websense) was founded in 1994 and is owned by defense contractor Raytheon. Forcepoint CASB is based on…
See our complete list of Top CASB Vendors. Company information Cloudlock was founded in 2011 and began shipping its CASB in October 2013. The company was acquired by Cisco…