cybersecurity tools

Wiz Adds Integration Platform to Improve Cybersecurity Visibility
Wiz this week unveiled a platform that provides bi-directional integration between its namesake cloud-native application protection platform (CNAPP) and third-party cybersecurity platforms. At the same time, Wiz also announced it signed a ...

Suffering From a Surfeit of Security Tools
It’s almost ingrained in our collective psyche that more of a good thing is an even better thing. If you have one of something that you really like, then there is nothing ...

Cybersecurity Vendor Consolidation on the Horizon
A survey of 280 cybersecurity professionals conducted by the research firm Enterprise Strategy Group (ESG) on behalf of Information Systems Security Association (ISSA) found nearly half (46%) of respondents work at organizations ...

How Open XDR Can Prevent Cyberattacks
Analytics seems to be the answer for almost anything, and security is no exception. Most professionals agree that analytics could hold the key to uncovering early actions from attackers with the goal ...

XDR Has Promise – and a Fair Share of Risks
The security industry is often an alphabet soup of confusing acronyms—SIEM, SOAR, SASE—and the latest acronym du jour is XDR. At first glance, you may conflate it with terms such as NDR ...

Report: Increased Spending on Compliance Not Helping Security
A global survey of 750 IT decision-makers suggests that increased spending on compliance isn’t doing much to improve the security posture of organizations. Conducted by Vanson Bourne on behalf of Tanium, a ...

Untangle Extends Security Alliance With Webroot
Untangle has deepened its alliance with Webroot to provide tighter integration between the control plane Untangle uses to manage firewalls and the endpoint security software provided by Webroot. Heather Paunet, vice president ...

The More Cybersecurity Changes, the More It Stays the Same
It is time for an evolution in cybersecurity that focuses on adversary disruption Despite major advancements in technology, the global approach to cybersecurity has remained the same for decades: Respond and recover ...
The three scariest breach consequences for CIOs
Despite the recent rash of high-profile data breaches, research shows that many CIOs are still moving too slowly in their efforts to improve their organization’s security tools and best practices. A recent ...
The three scariest breach consequences for CIOs
Despite the recent rash of high-profile data breaches, research shows that many CIOs are still moving too slowly in their efforts to improve their organization’s security tools and best practices. A recent ...