HomeCybersecurity

Cybersecurity

FBI Crime Report Lists Business Email Compromise as Top Scam

When the FBI released its 2018 Internet Crime Report on April 22, one topic appeared as the very first of the hot topics that...

Tufin Software Review for 2021

Today: Tufin (network security policy management)Company description: Tufin (pronounced TWO-fin) is a provider of network security policy orchestration for enterprise cybersecurity. More than 2,000...

Flashpoint Improves Business Risk Intelligence Platform

Flashpoint announced on April 24 that it is updating its Business Risk Intelligence (BRI) platform with new capabilities designed to help organizations get more...

How to Know if ML, AI in Security is the Right Fit

This eWEEK Data Points article looks under the hood at what security vendors are really offering in the way of machine learning and artificial...

VMware Updates PKS to Advance Enterprise Kubernetes

VMware announced version 1.4 of Enterprise PKS on April 23, bringing new functionality to help organizations operationalize the cloud-native Kubernetes container orchestration platform.PKS, which...

FBI Internet Crime Center Reports $2.7B in 2018 Fraud

The FBI's Internet Crime Center (IC3) released its annual Internet Crime Report on April 22, revealing a dramatic spike in the amount of financial...

Best SIEM Tools & Vendors

What is SIEM? It’s acronymed SIEM, pronounced “sim” and has taken its place among the most important sectors in all of IT. Security Information and...

Cloud Security Spending Set to Grow, Forrester Forecasts

As demand and adoption of the cloud continue to grow, there is corresponding growth in organizations spending more on technologies to secure cloud workloads,...

How to Avoid the New DNS Hijacking Attacks

DNS Hijacking has been around for a while. Initially it began as a way for the bad guys to take you to a fake...

How Google Is Using Content Security Policy to Mitigate Web Flaws

Cross Site Scripting, commonly referred to as XSS, is among the most pervasive flaws on the web today.With an XSS flaw, an attacker is...