Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about…
WhiteHat Security got its start some 17 years ago in Silicon Valley to help companies defend their public-facing websites from…
Encryption is a cornerstone of digital commerce. But it has also proven to be a profound constraint on the full…
Many companies take an old-school approach to bringing up the rear guard, if you will, when it comes to protecting…
Security information and event management systems — SIEMs — have been around since 2005, but their time may have come…
Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real…
When it comes to defending their networks, most companies have had it drilled into them, by now, that it’s essential…
Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at…
From the start, two-factor authentication, or 2FA, established itself as a simple, effective way to verify identities with more certainty.…
An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy…