Security News & Reviews

More Security News


Predictions 2021: IT Security and Personal Data Privacy

eWEEK PREDIXIONS: With the sun rising on 2021, security pros are turning their attention toward another year of trying to catch up with the bad actors.

Top Cloud-Access Security Vendors for 2021

eWEEK TOP COMPANIES: A whole new sector of IT has sprung up in the last decade focused on cloud-access security--acronymed CASB (for cloud access security brokers)--which requires very different skills and tools from data center or campus-centric security.

Lesson from SolarWinds Hack: Why IT Should Rethink On-Premises Tooling

eWEEK SECURITY ANALYSIS: The targeted update from SolarWinds is getting a lot of grief for these issues; however, the fact is that any one of hundreds of similar applications used by the government could have been used in the same manner.
storage vendors

Top Data Storage Vendors for 2021

eWEEK TOP COMPANIES: Here are the best data storage companies in enterprise IT, as compiled by eWEEK and using various analysts as guides.

How to Avoid Common Pitfalls Associated with IGA Implementations

eWEEK DATA POINTS: Identity Governance and Administration (IGA) is able to do several valuable things simultaneously: reduce security risk, strengthen compliance and improve efficiency through automation of processes. An industry veteran, Morten Boel Sigurdsson of Omada, shares five proven...

How Ermetic Tackles Public Cloud Risks by Securing Identities, Entitlements

eWEEK CLOUD SECURITY ANALYSIS: Enterprises are experiencing a startling increase in intrusions and compromises as they move to the public cloud. Ermetic tackles those cybersecurity issues by securing the who, what, when, and where of cloud activity. In other words, securing identities and entitlements...

How Data Theorem Brings Full-Stack Security to Multi-Platform Web Apps

eWEEK PRODUCT TEST AND REVIEW: As more and more enterprises move to the DevOps model to accelerate the development of software, many are finding that application security is often an afterthought. Data Theorem aims to bring visibility, control, and security to cloud applications.

Industry Perspective: Demystifying Confidential Computing

eWEEK INDUSTRY PERSPECTIVE: Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). It is a fast-rising subsector of data security that has earned a lot of attention in recent months.

Samsung Galaxy XCover Pro: Durability for Tough Work Stations

eWEEK PRODUCT TEST AND REVIEW: The Samsung Galaxy XCover Pro is made to be dropped; in fact, I think it likes being dropped. A big advantage is this: It doesn’t look or feel like one of those bulky, heavy, “rugged” phones you would use out on an oil rig; it looks like a regular business or...

Why Data Security Will Face Even Harsher Hackers in 2021

eWEEK PREDIXIONS 2021: Ransomware attacks will shift from “I’ve stolen all your data, now pay me” to “I'm going to extort your CEO with information I’ve found in the data I’ve stolen from you, and if you don't pay, we’ll devalue your stock on Wall Street.”

How to Fortify Your Holiday E-commerce AppSec Readiness

eWEEK DATA POINTS: According to Verizon’s 2020 Data Breach Investigations Report, vulnerable web apps are the main cause of retail data breaches, meaning brands would be wise to prioritize the security of their e-commerce apps and software to create a safer online shopping experience for their...

Cybersecurity Tips for Online Shoppers During the Holidays

eWEEK SECURITY ANALYSIS: Consumers cannot be too careful when shopping online. Hackers are sitting in wait for excited buyers who unknowingly use fake-front sites that can come back to bite them.

How Deception Technology Can Paralyze Attackers

eWEEK DATA POINTS: Deception systems look at security differently; they dismiss most false positives by looking for anomalies, but the events are reduced to “yes” or “no" instead of infinite possibilities.

Enterprise Tech Videos