Security

Security | News, how-tos, features, reviews, and videos

Closeup on businessman holding a card with DLP Data Loss Prevention message
Headshot of Jean-Christophe Le Toquin, President at CyAN

Illustration of businessman archery on king chess growth chart aiming at target

Informatica CEO plots data-centric return

Amit Walia has taken Informatica public again, but the company is different this time around

There is a lock against a dark blue background. concept of cybersecurity.

Strengthening cybersecurity with digital twin thinking

Neo4j’s Maya Natarajan explains how graph technology can help you potentially get ahead of the hackers

Workers working on computer that says Password and has a lock icon

Enterprise Password Managers: Which solution is best?

Peerspot users review the highest rated solutions in the enterprise password manager market.

Businessman walking on twisted rope high in sky

Removing security complexity to combat cyber threats

Businesses are struggling with an overwhelming, and increasingly complex and confusing cyber world. Ian McShane, Field CTO at Arctic Wolf looks at how cyber simplicity is the key for businesses to move forward with their security...

Endpoint Security Solutions Concept with Virtual Shield and Laptop Connected to the Digital Cloud

Endpoint Encryption: Which solution is best?

Peerspot users review the highest rated solutions in the endpoint encryption market.

Businessman using mobile smart phone and security shielding icon.

Application Security Tools: Which solution is best?

Peerspot users review the highest reviewed solutions in the application security tool market

A businessman reaching out to touch a user type login, and password

Auth0 vs Azure Active Directory (Azure AD): Which Single Sign-On (SSO) solution is better?

Peerspot users evaluate two of the highest reviewed solutions in the Single Sign-On (SSO) market – Auth0 and Azure Active Directory (Azure AD).

Businessman on mobile phone logging in to secure account

Single Sign-On (SSO): Which solution is best?

Peerspot users review the highest reviewed solutions in the single sign-on market.

IDGConnect_UK_businesses_cyber_threats_shutterstock_1978834034_1200x800

UK businesses struggle with cyber threats

The 3 key threats that UK businesses should watch out for are geopolitical hacking, vulnerable developer environments, and machine identity outages. Each of these pose unique problems to business leaders that, if left unattended, can...

A criminal lock on a cloud that’s stuck behind chains with a red binary background

Hacking the cloud: why APIs are now a top threat

The Application Programming Interface (API) is now integral to many services but it’s also a key target for attackers. Jason Kent, Hacker in Residence at Cequence Security, looks at why insecure APIs are now topping threat charts.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

Illustration of different endpoints with a security shield in the centre, concept of secure access

Secure Access Service Edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

People having a meeting in executive conference room with cityscape as the background

How to communicate risk to the board: the ‘Goldilocks’ approach

Boards care about risk – while boards are getting more IT-savvy members to cope with the challenges and changes that are taking place around their businesses, they really care about risk. Boards and executives are now approaching...

Cyber security illustration. Lock icon. Digital information and database protection

Database Security: Which solution is best?

Peerspot users review the highest reviewed solutions in the database security market.

Multiple endpoints with a security symbol in the middle

Endpoint Detection and Response (EDR): Which solution is best?

Peerspot users review the highest reviewed solutions in the endpoint detection and response (EDR) market.

IDGConnect_CISO_security_career_future_role_shutterstock_1798108945_1200x800

The CISO of tomorrow

It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could be about to change. Jamal Elmellas, COO at...

IDGConnect_worlds_worst_passwords_shutterstock_1819491845_1200x800

What are the world’s worst passwords?

World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.

Load More