Security News & Reviews

More Security News

Health.Care.Security

Predictions 2021: IT Security and Personal Data Privacy

|
eWEEK PREDIXIONS: With the sun rising on 2021, security pros are turning their attention toward another year of trying to catch up with the bad actors.
1088_CASBVendors

Top Cloud-Access Security Vendors for 2021

|
eWEEK TOP COMPANIES: A whole new sector of IT has sprung up in the last decade focused on cloud-access security--acronymed CASB (for cloud access security brokers)--which requires very different skills and tools from data center or campus-centric security.
cozy.bear.hackers

Lesson from SolarWinds Hack: Why IT Should Rethink On-Premises Tooling

|
eWEEK SECURITY ANALYSIS: The targeted update from SolarWinds is getting a lot of grief for these issues; however, the fact is that any one of hundreds of similar applications used by the government could have been used in the same manner.
storage vendors

Top Data Storage Vendors for 2021

|
eWEEK TOP COMPANIES: Here are the best data storage companies in enterprise IT, as compiled by eWEEK and using various analysts as guides.
Omada.logo

How to Avoid Common Pitfalls Associated with IGA Implementations

|
eWEEK DATA POINTS: Identity Governance and Administration (IGA) is able to do several valuable things simultaneously: reduce security risk, strengthen compliance and improve efficiency through automation of processes. An industry veteran, Morten Boel Sigurdsson of Omada, shares five proven...
Ermetic2

How Ermetic Tackles Public Cloud Risks by Securing Identities, Entitlements

|
eWEEK CLOUD SECURITY ANALYSIS: Enterprises are experiencing a startling increase in intrusions and compromises as they move to the public cloud. Ermetic tackles those cybersecurity issues by securing the who, what, when, and where of cloud activity. In other words, securing identities and entitlements...
Data.Theorem.door

How Data Theorem Brings Full-Stack Security to Multi-Platform Web Apps

|
eWEEK PRODUCT TEST AND REVIEW: As more and more enterprises move to the DevOps model to accelerate the development of software, many are finding that application security is often an afterthought. Data Theorem aims to bring visibility, control, and security to cloud applications.
StorMagic.logo

Industry Perspective: Demystifying Confidential Computing

|
eWEEK INDUSTRY PERSPECTIVE: Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). It is a fast-rising subsector of data security that has earned a lot of attention in recent months.
Samsung.XCoverPro

Samsung Galaxy XCover Pro: Durability for Tough Work Stations

|
eWEEK PRODUCT TEST AND REVIEW: The Samsung Galaxy XCover Pro is made to be dropped; in fact, I think it likes being dropped. A big advantage is this: It doesn’t look or feel like one of those bulky, heavy, “rugged” phones you would use out on an oil rig; it looks like a regular business or...
Randori.David.Moose.Wolpoff

Why Data Security Will Face Even Harsher Hackers in 2021

|
eWEEK PREDIXIONS 2021: Ransomware attacks will shift from “I’ve stolen all your data, now pay me” to “I'm going to extort your CEO with information I’ve found in the data I’ve stolen from you, and if you don't pay, we’ll devalue your stock on Wall Street.”
eCommerce.holidays

How to Fortify Your Holiday E-commerce AppSec Readiness

|
eWEEK DATA POINTS: According to Verizon’s 2020 Data Breach Investigations Report, vulnerable web apps are the main cause of retail data breaches, meaning brands would be wise to prioritize the security of their e-commerce apps and software to create a safer online shopping experience for their...
Online.fraud.guy.hoodie

Cybersecurity Tips for Online Shoppers During the Holidays

|
eWEEK SECURITY ANALYSIS: Consumers cannot be too careful when shopping online. Hackers are sitting in wait for excited buyers who unknowingly use fake-front sites that can come back to bite them.
Illusivenetworks.logo

How Deception Technology Can Paralyze Attackers

|
eWEEK DATA POINTS: Deception systems look at security differently; they dismiss most false positives by looking for anomalies, but the events are reduced to “yes” or “no" instead of infinite possibilities.

Enterprise Tech Videos