Category: esecurityplanet

SIEM Explained: What is SIEM and How Does it Work?

This article has been indexed from eSecurityPlanet Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger enterprise clients, but they have become more reasonable…

Top Single Sign-On (SSO) Solutions for 2022

This article has been indexed from eSecurityPlanet Single sign-on (SSO) is one of several authentication technologies aimed at streamlining and keeping login information and processes secure. SSO makes it feasible for one login to be enough for a group of…

Top Single Sign-On (SSO) Solutions

This article has been indexed from eSecurityPlanet Single sign-on (SSO) is one of several authentication technologies aimed at streamlining and keeping login information and processes secure. SSO makes it feasible for one login to be enough for a group of…

Nmap Vulnerability Scanning Made Easy

This article has been indexed from eSecurityPlanet The UK government recently started an open-source GitHub repository to help organizations scan networks for vulnerabilities. The idea behind the Scanning Made Easy project from the National Cyber Security Centre (NCSC) and its…

Best Internet Security Suites & Software for 2022

This article has been indexed from eSecurityPlanet Malware is one of the biggest threats businesses face, and with nearly a third of all malware coming through the internet and email, businesses and consumers alike need ways to protect themselves. The…

Zoom Security Issues Are a Wakeup Call for Enterprises

This article has been indexed from eSecurityPlanet Video conferencing vendor Zoom has seen its fortunes soar amid the remote work boom of the last two years, and other cloud collaboration platforms like Microsoft Teams and Cisco Webex have seen demand…

Zoom Security Issues a Wakeup Call for Enterprises

This article has been indexed from eSecurityPlanet Video conferencing vendor Zoom has seen its fortunes soar amid the remote work boom of the last two years, and other cloud collaboration platforms like Microsoft Teams and Cisco Webex have seen demand…

How Hackers Compromise the Software Supply Chain

This article has been indexed from eSecurityPlanet It seems like a week doesn’t go by without a new vulnerability demonstrating the fragility of the software interdependencies that make up the software supply chain. A large part of software development leverages…

White House Boosts Zero Trust with New Cybersecurity Strategy

This article has been indexed from eSecurityPlanet The Biden Administration is pushing federal agencies to adopt a zero-trust security architecture to protect themselves and their data from “increasingly sophisticated and persistent threat campaigns,” according to a new strategy issued this…

Best Managed Security Service Providers (MSSPs)

This article has been indexed from eSecurityPlanet As threats mount from ransomware gangs, Russian-backed hacker groups, and other nation-sponsored attackers and as the growth in remote work makes security management increasingly complicated, many companies are finding it makes sense to…

Best Network Monitoring Tools for 2022

This article has been indexed from eSecurityPlanet Network monitoring is where business performance meets cybersecurity, making it a critical component of any organization’s development, security, and operations (DevSecOps) pipeline. With the rise of enterprise networks in the past few decades…

WireGuard vs. OpenVPN: Comparing Top VPN Protocols

This article has been indexed from eSecurityPlanet Virtual Private Networks (VPNs) provide secure access to business files for remote workers, making them a crucial part of an enterprise’s technology stack. But they need the right protocols to run properly. A…

Top Network Access Control (NAC) Solutions for 2022

This article has been indexed from eSecurityPlanet With so many employees working remotely, the importance of secure network access control (NAC) has never been higher. In this guide, we showcase the industry’s leading NAC solutions along with an overview of…

Attacks Escalating Against Linux-Based IoT Devices

This article has been indexed from eSecurityPlanet Incidents of malware targeting Linux-based Internet of Things (IoT) devices jumped by more than a third in 2021, with three malware families the primary drivers behind the increase. According to a report by…

5 Trends in Patch Management for 2022

This article has been indexed from eSecurityPlanet The profile of patch management has risen considerably in the last year due to the number of major breaches that have taken place where basic patches had been overlooked. News stories repeatedly note…

Open Source Sabotage Incident Hits Software Supply Chain

This article has been indexed from eSecurityPlanet An astonishing incident in recent days highlights the risks of widespread dependence on open source software – while also highlighting the free labor corporations benefit from by using open source software. Marak Squires,…

Iran-Based APT35 Group Exploits Log4J Flaw

This article has been indexed from eSecurityPlanet Security researchers are continuing to see state-supported hacking groups developing tools to leverage the high-profile Log4j vulnerability that exploded onto the scene last month even as the White House and other parts of…

Cybersecurity Employment in 2022: Solving the Skills Gap

This article has been indexed from eSecurityPlanet As we enter 2022, the shortage of cybersecurity pros hasn’t gotten better. In fact, it’s gotten worse. There are currently about 435,000 cybersecurity job openings available in the United States, up from approximately…

Top Cybersecurity Startups to Watch in 2022

This article has been indexed from eSecurityPlanet Information security products, services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. Investors recognize the potential too, as funding for cybersecurity ventures more than…

How to Use MITRE ATT&CK to Understand Attacker Behavior

This article has been indexed from eSecurityPlanet MITRE ATT&CK (“miter attack”) is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate security issues and…

How to Comply with GDPR, PIPL and CCPA

This article has been indexed from eSecurityPlanet Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA. The post How to Comply with GDPR, PIPL and…

How to Comply with GDPR, PIPL, and CCPA

This article has been indexed from eSecurityPlanet Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA. The post How to Comply with GDPR, PIPL, and…

The Link Between Ransomware and Cryptocurrency

This article has been indexed from eSecurityPlanet There are few guarantees in the IT industry, but one certainty is that as the world steps into 2022, ransomware will continue to be a primary cyberthreat. The dangers from ransomware have risen…

Implementing and Managing Your SIEM Securely: A Checklist

This article has been indexed from eSecurityPlanet Some companies use cloud-based security information and event management (SIEM), and others use SIEM that has been installed in a local data center. These on-premises SIEMs can be run on Windows Servers, Linux…

10 Best CASB Security Vendors of 2022

This article has been indexed from eSecurityPlanet Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity.  With the adoption of cloud-based applications and services growing exponentially, especially as a…

How to Develop an Incident Response Plan

This article has been indexed from eSecurityPlanet We make IT, security, or any business decision by weighing the risks and the rewards. What investments can we make to drive down costs or increase sales? Or as is often the case…

Top Cybersecurity Accounts to Follow on Twitter

This article has been indexed from eSecurityPlanet ​​​​​​​​Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Here…

Fortinet vs Palo Alto Networks: Top NGFWs Compared

This article has been indexed from eSecurityPlanet A next-generation firewall (NGFW) is an important component of network security and represents the third generation of firewall technology. NGFWs provide capabilities beyond that of a traditional, stateful firewall, including cloud-delivered threat intelligence,…

Top IT Asset Management Tools for Security

This article has been indexed from eSecurityPlanet IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also offer some kind…

Best Privileged Access Management (PAM) Software for 2022

This article has been indexed from eSecurityPlanet Privileged accounts are among an organization’s biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average system users don’t have permission to access or change.…

Top IoT Security Solutions of 2021

This article has been indexed from eSecurityPlanet IoT security is where endpoint detection and response (EDR) and enterprise mobility management (EMM) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack surface grows, IoT is yet…

How Hackers Use Payloads to Take Over Your Machine

This article has been indexed from eSecurityPlanet A payload is a piece of code that executes when hackers exploit a vulnerability. In other words, it’s an exploit module. It’s usually composed of a few commands that will run on the…

Top Secure Email Gateway Solutions for 2021

This article has been indexed from eSecurityPlanet Email is typically the channel through which ransomware and malware are unleashed upon the enterprise. Phishing scams use it to compromise networks. Executives are conned by fake emails into sending funds to the…

HTML Smuggling Techniques on the Rise: Microsoft

This article has been indexed from eSecurityPlanet Bad actors are increasingly using a technique called HTML smuggling to deliver ransomware and other malicious code in email campaigns aimed at financial services firms and other organizations, according to Microsoft researchers. In…

Hacker Compromises FBI Server to Send Fake Emails

This article has been indexed from eSecurityPlanet Hackers got into an email server at the FBI over the weekend to spread fake messages in an attempt to blame a cybersecurity expert for non-existent attacks, apparently in hopes of damaging his…

DDoS Attacks Skyrocket, Kaspersky Researchers Say

This article has been indexed from eSecurityPlanet Distributed denial of service (DDoS) attacks soared in the third quarter, giving organizations yet another cyber threat to worry about. Kaspersky researchers reported that total attacks were up by about a third from…

Microsegmentation Is Catching On as Key to Zero Trust

This article has been indexed from eSecurityPlanet For a security technology that’s only a few years old, microsegmentation is catching on quickly. According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believe microsegmentation is…

Arrest in Kaseya Attack Highlights Government Ransomware Progress

This article has been indexed from eSecurityPlanet U.S. law enforcement officials this week announced the indictments of a Ukrainian national and a Russian citizen in connection with ransomware campaigns by the recently shuttered REvil cybercriminal group, including the high-profile attack…

Best Risk Management Software for 2021

This article has been indexed from eSecurityPlanet Every organization needs visibility into the potential threats they face daily. Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution.  While a number of solutions…

Secure Access for Remote Workers: RDP, VPN & VDI

This article has been indexed from eSecurityPlanet A fundamental cornerstone of security is layers. We use passwords to authenticate our users, run antivirus to keep malware off our endpoints, monitor our networks, and implement firewalls so we can have multiple…

Fake Company Sheds Light on Ransomware Group Tactics

This article has been indexed from eSecurityPlanet Ransomware groups seem to change form daily. In the latest news, the BlackMatter ransomware group announced it was shutting down – and just hours later came news that its victims were being transferred…

IBM Moves Into EDR Market With ReaQta Acquisition

This article has been indexed from eSecurityPlanet IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its move into the XDR market. Extended detection and…

Twitch Breach Shows the Difficulty of Cloud Security

This article has been indexed from eSecurityPlanet Cloud security is a delicate balancing act of keeping the freedoms that make migration worthwhile while also keeping a company’s data secure. A recent breach of Twitch, an Amazon-owned company, showed businesses just…

Types of Firewalls Explained

This article has been indexed from eSecurityPlanet This post has been updated for 2021. Firewalls are as central to IT security as antivirus programs are to PCs, and the multi-billion-dollar market remains large and growing. In the broadest terms, firewalls…

SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

This article has been indexed from eSecurityPlanet Cybercriminals leveraging the SolarMarker .NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials and data within. According to…

Choosing a Managed Security Service: MDR, Firewalls & SIEM

This article has been indexed from eSecurityPlanet Many large enterprises struggle to stay on top of serious cyber threats like ransomware. For a small business, the challenge can seem overwhelming. Between the growing threats and a shortage of cybersecurity talent…

CrowdStrike vs Symantec: Top EDR Solutions Compared

This article has been indexed from eSecurityPlanet Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product list, they’re very different security products that will…

4 Best Antivirus Software of 2021

This article has been indexed from eSecurityPlanet What’s the best antivirus software? With the rise in malware and ransomware and a growing reliance on the internet, antivirus solutions are critical for protecting your data and applications. We here at eSecurity…

SBOMs: Securing the Software Supply Chain

This article has been indexed from eSecurityPlanet As threat actors aim at IT supply chains, enhanced cybersecurity has been the recent driving force for industry adoption of the Software Bill of Materials (SBOM) framework. With a simple list of components…

CNAP Platforms: The Next Evolution of Cloud Security

This article has been indexed from eSecurityPlanet Businesses have far more cloud security options than they once did, making clouds often as safe as, if not safer than, on-premises solutions. Still, cloud security has grown increasingly complicated as application development…

Top Open Source Security Tools

This article has been indexed from eSecurityPlanet Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge…

How Machine Identities Can Imperil Enterprise Security

This article has been indexed from eSecurityPlanet Managing machine identities has never been more critical to an enterprise’s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper…

Windows 11 Security Features & Requirements

This article has been indexed from eSecurityPlanet Windows 11 started rolling out on October 5 for personal devices, but everyone likely won’t have access to the upgrade until the middle of 2022. Regardless of when they get Windows 11, businesses…

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

This article has been indexed from eSecurityPlanet Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in the Asia-Pacific region.…

Becoming a Cybercriminal Keeps Getting Easier

This article has been indexed from eSecurityPlanet Zero-day vulnerabilities are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these previously unknown security flaws. That was one of the…

New Python-based Ransomware Encrypts Virtual Machines Quickly

This article has been indexed from eSecurityPlanet Sophos cybersecurity researchers have discovered a Python-based ransomware operation that escalated from a compromised corporate network to encrypted virtual machines in just three hours. VMware ESXi datastores rarely have endpoint protection, the researchers…

ESET PROTECT Advanced Review: Features & Benefits

This article has been indexed from eSecurityPlanet ESET might not have the name recognition of some other long-time cybersecurity companies, but at around 30 years old, the Slovakia-based company has been around longer than many of its rivals. And like…

Qualys Automates Ransomware Risk Assessment

This article has been indexed from eSecurityPlanet Qualys this week launched a new Ransomware Risk Assessment Service that’s designed to help enterprises understand their potential exposure to ransomware and automate the process of patching any associated vulnerabilities or misconfigurations. The…

White House, Congress Target Ransomware Payments

This article has been indexed from eSecurityPlanet The surge in ransomware attacks in the last year have spurred attempts by government officials to bolster cybersecurity defenses, and those actions advanced on multiple fronts this week. In an op-ed piece published…

What are Network Firewalls?

This article has been indexed from eSecurityPlanet This post has been updated for 2021. The network firewall is the first line of defense for traffic that passes in and out of a network. The firewall examines traffic to ensure it…

How Ransomware Uses Encryption – And Evolves

This article has been indexed from eSecurityPlanet Ransomware attacks are a huge concern these days, especially for corporate networks. Successful assaults can lead to locked up data and systems, as well as stolen and leaked data, bringing chaos to the…