Tag: esecurityplanet

Zero Trust: Can It Be Implemented Outside the Cloud?

Only cloud service providers are getting cybersecurity right, and the implications for the future of IT are enormous. The post Zero Trust: Can It Be Implemented Outside the Cloud? appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet…

Western Digital Cyber Attack a ‘Wake Up Call for ASIC Vendors’

Update: In a statement on the extent of the data breach disclosed last month, Western Digital said it has control of its digital certificate infrastructure and is “equipped to revoke certificates as needed.” “Regarding reports of the potential to fraudulently…

Microsoft Flaws Include Secure Boot Bypass, System-Level Takeovers

Microsoft’s Patch Tuesday for May 2023 fixes two actively exploited vulnerabilities, including a Secure Boot bypass and system-level takeover. The post Microsoft Flaws Include Secure Boot Bypass, System-Level Takeovers appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet…

What Is a Passkey? The Future of Passwordless Authentication

Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now. The post What Is a Passkey? The Future of Passwordless Authentication appeared first on eSecurityPlanet. This article has been indexed…

Top 12 Web Application Firewall (WAF) Solutions in 2023

Web application firewalls (WAFs) are critical for robust application security. Compare the best WAF solutions now. The post Top 12 Web Application Firewall (WAF) Solutions in 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the…

Google Launches Passkeys in Major Push for Passwordless Authentication

Passkeys are a promising technology for passwordless authentication, and Google is leading the way. The post Google Launches Passkeys in Major Push for Passwordless Authentication appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article:…

What is IT Asset Management (ITAM)? Definition, Benefits & Types

IT Asset Management is the process of tracking and managing IT assets. Learn more about ITAM, its benefits, and best practices. The post What is IT Asset Management (ITAM)? Definition, Benefits & Types appeared first on eSecurityPlanet. This article has…

Automated Patch Management: Definition, Tools & How It Works

Learn how automated patch management works, best practices, the top tools, and how automated patching can help improve network security. The post Automated Patch Management: Definition, Tools & How It Works appeared first on eSecurityPlanet. This article has been indexed…

Patch Management vs Vulnerability Management: What’s the Difference?

Learn about the similarities and differences between patch and vulnerability management and what to look for in a solution. The post Patch Management vs Vulnerability Management: What’s the Difference? appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet…

ChatGPT Security and Privacy Issues Remain in GPT-4

GPT-4 has many of ChatGPT’s malicious capabilities, in some cases even enhancing them. The post ChatGPT Security and Privacy Issues Remain in GPT-4 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: ChatGPT Security…

8 Best Password Managers for Business & Enterprises in 2023

Password managers provide an advanced level of security for business accounts. Compare top password managers now. The post 8 Best Password Managers for Business & Enterprises in 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read…

Top 10 Cloud Access Security Broker (CASB) Solutions for 2023

Compare the top cloud access security broker (CASB) solutions to ensure your cloud environments are secure. The post Top 10 Cloud Access Security Broker (CASB) Solutions for 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read…

Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed

Development teams are exposing critical data and secrets online. Here’s what to do about it. The post Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original…

SPanel: Taking Website Security to the Next Level

SPanel is a web hosting environment that takes website security seriously. Learn more about the platform now. The post SPanel: Taking Website Security to the Next Level appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the…

Attackers Continue to Leverage Signed Microsoft Drivers

In December of last year, Microsoft worked with SentinelOne, Mandiant, and Sophos to respond to an issue in which drivers certified by Microsoft’s Windows Hardware Developer Program were being used to validate malware. Unfortunately, the problem hasn’t gone away. In…

7 Database Security Best Practices: Database Security Guide

Databases contain some of an organization’s most sensitive data, so following database security best practices is critical for protecting that data from cyberattacks and insider data theft. Effective database security encloses sensitive information within layers of controls that decrease the…

What Is a Vulnerability Assessment? Types, Steps & Benefits

Learn what a vulnerability assessment is, how to perform a vulnerability scan, & the best practices for vulnerability management. The post What Is a Vulnerability Assessment? Types, Steps & Benefits appeared first on eSecurityPlanet. This article has been indexed from…

5 Best Bot Protection Solutions and Software for 2023

Bot protection solutions help protect your business from malicious bots. Compare the best solutions now. The post 5 Best Bot Protection Solutions and Software for 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original…

Western Digital Cyber Attack a ‘Wake Up Call for ASIC Vendors’

A massive cyber attack targeting drive maker Western Digital Corp. (WDC) could potentially have serious and long-term implications. One of the hackers apparently disclosed the extent of the cyber attack to TechCrunch this week. Hackers accessed a range of company…

Ivanti Policy Secure: NAC Product Review

As a spinoff of the network infrastructure leader, Juniper Networks, Ivanti’s Policy Secure provides effective network access control built on a foundation of deep understanding of networks. However, with three rebrandings since 2014, many potential customers may not recognize the…

Top Endpoint Detection and Response (EDR) Solutions in 2023

EDR solutions ensure an organization’s endpoints are running properly by monitoring and troubleshooting tech on the network. Compare the top tools now. The post Top Endpoint Detection and Response (EDR) Solutions in 2023 appeared first on eSecurityPlanet. This article has…

7 Steps of the Vulnerability Assessment Process Explained

A vulnerability assessment is one of the most important pieces of an enterprise’s vulnerability management lifecycle because you can’t fix security vulnerabilities you know nothing about. Through the vulnerability assessment process, networks and assets are scanned and newly discovered vulnerabilities…

Windows CLFS Vulnerability Used for Ransomware Attacks

Microsoft’s Patch Tuesday for April 2023 targets 97 vulnerabilities, seven of them rated critical – as well as one that’s currently being exploited in the wild. The one flaw that’s currently being exploited, CVE-2023-28252, is an elevation of privilege vulnerability…

What is Network Security? Definition, Threats & Protections

Network security creates shielded, monitored, and secure communications between users and assets. Despite the rapid evolution of what constitutes the users, assets, and connections, the fundamentals of networking security remain the same: block external threats, protect internal network communications, monitor…

What Is a DMZ Network? Definition, Architecture & Benefits

A DMZ network, or a demilitarized zone, is a subnetwork in an enterprise networking environment that contains public-facing resources — such as web servers for company websites — in order to isolate them from an enterprise’s private local area network…

Extreme Networks ExtremeControl: NAC Product Review

As a leader in wireless and wired large area network (LAN) infrastructure, Extreme Networks deeply understands the operational requirements for networks and the IT teams managing them. To aid in reducing IT labor requirements and to improve security, Extreme Networks…

Over 15 Million Systems Exposed to Known Exploited Vulnerabilities

Effective vulnerability management is about knowing what you own and prioritizing what you need to fix. A new research report shows that millions of organizations are failing at those critical cybersecurity practices. Researchers at cybersecurity firm Rezilion found more than…

5 Best LastPass Alternatives in 2023

LastPass is a popular cloud-based password manager that allows users to secure, manage, and retrieve their passwords and other confidential information. One of our picks for the best password managers, LastPass offers features such as password autofill, automatic password generation,…

Top 26 Cybersecurity Experts & Accounts to Follow on Twitter

Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now. The post Top 26 Cybersecurity Experts & Accounts to Follow on Twitter appeared first on eSecurityPlanet. This article…

Top 60 Cybersecurity Startups to Watch

Discover the 70 hottest cybersecurity startups to watch in 2023. Learn more about their products, services, and more. The post Top 60 Cybersecurity Startups to Watch appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original…

Aruba ClearPass Policy Manager NAC Solution Review

  Originally designed as a network access control (NAC) solution, Aruba ClearPass continues to evolve into a portfolio of network security tools. Even as the capabilities expand, ClearPass continues to deliver on its central purpose of controlling network access at…

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

Enterprise IT, network and security product vulnerabilities were among those actively exploited in zero-day attacks last year, according to a recent Mandiant report. Mandiant tracked 55 zero-day vulnerabilities that were actively exploited in 2022. That’s fewer than the 81 zero-days…

8 Best User & Entity Behavior Analytics (UEBA) Tools for 2023

User and entity behavior analytics (UEBA) tools are a relatively recent offering that help businesses better understand cybersecurity threats. Similar terms for the technology include user behavior analytics (UBA), threat analytics, and security analytics. Many others have simply packaged UEBA…

13 Cloud Security Best Practices for 2023

From the very beginning of the cloud computing era, security has been the biggest concern among enterprises considering cloud services. For many organizations, the idea of storing data or running applications on infrastructure that they do not manage directly seems…

34 Most Common Types of Network Security Protections

Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable business assets. Network security is an umbrella term for all…

Microsoft Targets Critical Outlook Zero-Day Flaw

Microsoft’s Patch Tuesday for March 2023 includes patches for more than 70 vulnerabilities, including zero-day flaws in Outlook and in Windows SmartScreen. According to Crowdstrike researchers, 40 percent of the patched vulnerabilities are remote code execution flaws, down from 48…

10 Network Security Threats Everyone Should Know

Network security threats weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. Because businesses face an extensive array of threats, they should carefully monitor and mitigate the most critical threats and vulnerabilities.…

What is Network Security? Definition, Threats & Protections

Network security creates shielded, monitored, and secure communications between users and assets. Despite the rapid evolution of what constitutes the users, assets, and connections, the fundamentals of networking security remain the same: block external threats, protect internal network communications, monitor…

BlackMamba PoC Malware Uses AI to Avoid Detection

HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed “BlackMamba,” is…

Best DevOps, Website, and Application Vulnerability Scanning Tools

Compare the best commercial and open source web and app vulnerability scanners for website and application DevOps. The post Best DevOps, Website, and Application Vulnerability Scanning Tools appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the…

Best MSP/MSSP Vulnerability Scanning Tool Options

Compare vulnerability scanners tailored for the special needs of MSPs, MSSPs, and their customers. The post Best MSP/MSSP Vulnerability Scanning Tool Options appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best MSP/MSSP Vulnerability…

Best Enterprise Vulnerability Scanning Vendors

Compare the enterprise-ready vulnerability scanners for broad IT needs: networks, cloud, containers, and apps. The post Best Enterprise Vulnerability Scanning Vendors appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best Enterprise Vulnerability Scanning…

Best Small and Medium-sized Business (SMB) Vulnerability Scanning Tools

Compare the best IT infrastructure and application vulnerability scanners for resource-constrained SMBs. The post Best Small and Medium-sized Business (SMB) Vulnerability Scanning Tools appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best Small…

Best 3 Cloud, Container and Data Lake Vulnerability Scanning Tools

Compare specialty vulnerability scanning tools for modern cloud, container, and data lake infrastructure. The post Best 3 Cloud, Container and Data Lake Vulnerability Scanning Tools appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article:…

The 8 Best Vulnerability Scanner Tools for 2023

Vulnerability scanning tools are essential for keeping your site secure. Compare the best vulnerability scanners now. The post The 8 Best Vulnerability Scanner Tools for 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original…

What Is Penetration Testing? Complete Guide & Steps

Penetration tests are simulated cyber attacks executed by white hat hackers on systems and networks. The goal of these simulations is to detect vulnerabilities, misconfigurations, errors, and other weaknesses that real attackers could exploit. Pentesters work closely with the organization…

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress. President Biden came…

Vulnerability Management: Definition, Process & Tools

As enterprise networks continue to grow in size and complexity, so have the misconfigurations and vulnerabilities that could expose those networks to devastating cyber attacks and breaches. Vulnerability management is the process of prioritizing and minimizing those risks. When you…

Wireless Security: WEP, WPA, WPA2 and WPA3 Explained

Wireless security is the protection of wireless networks, devices and data from unwanted access and breaches. It involves a variety of strategies and practices designed to preserve the confidentiality, integrity and availability of wireless networks and their resources. Wireless security…

Main Targets of Ransomware Attacks & What They Look For

Ransomware has become a potent tool for cybercriminals looking to exploit companies’ sensitive data for profit. Ransomware attacks have affected businesses across all sizes, locations, and industries, from banking and financial services to utilities to education. When trying to keep…

Microsoft Warns of Surge in Token Theft, Bypassing MFA

The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent multi-factor authentication (MFA). “By compromising and replaying a token issued to an identity that has already completed multifactor authentication, the threat actor…

How to Use Input Sanitization to Prevent Web Attacks

Despite all of our investments in security tools, the codebase can be the weakest link for any organization’s cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. Attackers have been using classic flaws for years with a…

Patch Management Best Practices & Steps

Everyone needs effective patch management. This critical but tedious process secures organizations of all sizes by eliminating vulnerabilities and delivering product upgrades. Patching requires urgency. Attackers begin to reverse engineer patches immediately to exploit unpatched systems, even as organizations can…

What is Patch Management?

Patch management is the consistent and repeatable process of distributing and implementing updates to software, typically to address security and functionality issues. While difficult to get right, patch management is one of the most critical cybersecurity practices, and thus worth…

5 Best Rootkit Scanners and Removers in 2023: Anti-Rootkit Tools

A rootkit is a dangerous and stealthy malware type that enables hackers to take control of your system without your knowledge. Individuals and small businesses employ rootkit scanners to detect and remove rootkit malware. As “root” refers to operating system-level…

9 Best Next-Generation Firewall (NGFW) Solutions for 2023

Compare the best next-generation firewall solutions. Get the most comprehensive list of features and pricing now. The post 9 Best Next-Generation Firewall (NGFW) Solutions for 2023 appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original…

Red Team vs Blue Team vs Purple Team: Differences Explained

Red, blue and purple teams simulate cyberattacks and incident responses to test an organization’s cybersecurity readiness. Understanding how these teams operate is important for an organization that wants to test its cybersecurity defenses realistically — before an adversary does. The…

15 Best Encryption Software & Tools

As attackers continue to evolve their tactics, protecting exposed data with encryption remains a critical security practice. However, the type of encryption tool an organization needs depends upon its sophistication and use cases. While banks and government agencies might be…

Top 10 Full Disk Encryption Software Products

Protect your data with the best disk encryption software. Compare the top solutions now. The post Top 10 Full Disk Encryption Software Products appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Top 10…

How to Implement a Penetration Testing Program in 10 Steps

Penetration tests find security vulnerabilities before hackers do and are critical for keeping organizations safe from cyber threats. You can either create your own pentesting program or hire an outside firm to do it for you. Penetration test services have…

Best 5 Antivirus Software

Business antivirus software is critical for any organization with devices, applications, and networks to protect. These products, largely designed for smaller organizations, range from standard business-level antivirus tools to full-fledged anti-ransomware protection. Some of these solutions have more features than…

9 Best Next-Generation Firewall (NGFW) Vendors

Next-generation firewalls (NGFWs) are a core cybersecurity product, a foundational security tool every organization needs to protect their network from intruders. As defending data and applications become more complicated, the security products built to withstand evolving threats also grow more…

What Is Managed Detection and Response? Guide to MDR

Managed detection and response (MDR) goes beyond other managed security services by essentially giving organizations their own expert security analyst team to help identify and respond to cyber threats. The emergence of MDR was in many ways inevitable. Security has…

ESET PROTECT Review: Features & Benefits

Like many cybersecurity vendors, ESET continuously innovates to stay competitive as illustrated by the constant improvements to their flagship cloud-based endpoint protection platform, ESET PROTECT. The company and this product have earned their mention on our lists of top endpoint…

Microsoft Patch Tuesday Includes Three Exploited Zero-Day Vulnerabilities

Microsoft’s February 2023 Patch Tuesday fixes 75 vulnerabilities, nine of them rated critical, and three (all rated important) that are being exploited. “This is only the second Patch Tuesday of the year, and we have already tripled the number of…

Automated Security and Compliance Attracts Venture Investors

In 2013, Adam Markowitz founded Portfolium, an edtech startup that matched college students and graduates with employers. “I remember the first time we were asked for a SOC 2 report, which quickly became the minimum bar requirement in our industry…

Application Security: Complete Definition, Types & Solutions

Application security is the practice of securing software and data from hackers, whether that application comes from a third party or was developed in house, regardless of where it resides or how it’s accessed. As that definition spans the cloud…

What is Vulnerability Scanning & How Does It Work?

Vulnerability scanning is the process of scanning IT networks and systems to identify security vulnerabilities in hardware and software. As enterprise IT environments have grown more complex, the ways hackers can attack them have grown too. The edge, cloud computing,…

Top 7 Threat Intelligence Platforms

Threat intelligence platforms (TIPs) process external threat feeds and internal log files to create a prioritized and contextualized feed of alerts for a security team. TIPs also enhance security tools with consolidated and improved threat feeds. Our editorial team analyzed…

Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats

ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg,…

LookingGlass Cyber Solutions: Threat Intelligence Review

The LookingGlass scoutPrime threat intelligence platform (TIP) integrates enterprise-grade external security threat information with information on internal architecture and security information to create actionable, prioritized risk scores for threats. The TIP provides security professionals with accelerated analysis of how threats…

What is Vulnerability Scanning & How Does It Work?

Vulnerability scanning is the process of scanning IT networks and systems to identify security vulnerabilities in hardware and software. As enterprise IT environments have grown more complex, the ways hackers can attack them have grown too. The edge, cloud computing,…

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and…

Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats

ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg,…

SolarWinds Security Event Manager – SIEM Product Overview and Insight

SolarWinds lacks the full security suite presence of some competitors, but is well-integrated across a variety of bonus IT operation capabilities such as threat intelligence platform capabilities, privileged access management, USB security, and botnet detection. These additional capabilities make  the…

Fortinet vs Palo Alto: Compare Top Next-Generation Firewalls

Fortinet and Palo Alto Networks are two of the top cybersecurity companies and compete in a number of security markets, among them EDR and firewalls. Security buyers in the market for next-generation firewalls (NGFWs) often compare the two, and with good reason, as both…

IBM X-Force Exchange Threat Intelligence Platform

The top-ranked IBM X-Force Exchange threat intelligence platform (TIP) integrates enterprise-grade external security threat information with the tools a security professional needs to analyze how the threat might impact the organization. This article provides more in-depth information on the product…

IBM X-Force Exchange Threat Intelligence Platform

The top-ranked IBM X-Force Exchange threat intelligence platform (TIP) integrates enterprise-grade external security threat information with the tools a security professional needs to analyze how the threat might impact the organization. This article provides more in-depth information on the product…