Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He’s covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.
Malware has been around for nearly 40 years, longer even than the World Wide Web, but ransomware is a different kind of threat, capable of crippling a company and damaging…
Backup has in some sense always been about the security of data. In the event of a data loss or disaster, you could turn to your backup to retrieve the…
There’s a lot of code in the world, and a lot more is created every day. The browser you’re reading this article on is likely supported by millions of lines…
It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry. Enter microsegmentation as a…
With major cybersecurity incidents an almost daily occurrence, organizations need an incident response plan for the likelihood that they will someday be breached. And more than ever, they also need…
See our complete list of Top 10 SIEM Products. See . Bottom Line IBM’s QRadar core product is recognized by multiple analyst firms, including Gartner, Forrester, and Aberdeen, as…
See the complete list of top Endpoint Detection and Response solutions. Company description: CrowdStrike was founded in 2011 to fix sophisticated attacks that were forcing businesses into the headlines…
See our complete list of top penetration testing tools. Aircrack-ng Overview Aircrack-ng is the go-to tool for analyzing and cracking wireless networks. All the various tools within it use a…
See our complete list of top penetration testing tools. Bottom Line Wireshark is often found in the security toolkit. Pen testers use it to point out what is happening with…
See our complete list of top penetration testing tools. Bottom Line Fiddler is a useful collection of manual tools for dealing with web debugging, web session manipulation, and security and…