eSecurityPlanet Staff Avatar
  • Top 10 Ways to Secure a Windows File Server

    It’s a pretty safe bet that your company is storing valuable and confidential information on one or more Windows file servers right now. What may be less obvious is to…

  • 3 Facts about Sandbox-based Gateway Appliances

    By Sanjay Katkar, CTO, Quick Heal Technologies Sandbox-based gateway security appliances are widely used in enterprises both large and small, for plenty of good reasons. They are popular, effective, easy…

  • 5 Tips to Protect Networks Against Shodan Searches

    A recent round of media buzz has swarmed around the search engine called Shodan. If you’ve seen any stories like this or this, you’ve read that Shodan may be “the…

  • How VMI Can Improve Cloud Security

    By Nazar Tymoshyk, SoftServe Following Einstein’s wisdom, let me explain why cloud security is important, in terms that make sense to a six-year-old. Imagine that you have antivirus software installed…

  • Top 10 Encryption Tools You Should Know

    Encryption tools protect sensitive data from third parties. But encryption does not guarantee that files, removable media, email messages and network packets will not be hacked. Poorly written user authentication…

  • Using Hadoop to Reduce Security Risks

    By Ted Dunning, MapR Technologies Data has become too large to analyze with traditional tools, so companies are upping their security game by moving away from traditional approaches and instead…

  • 5 Ways to Make Public Cloud More Secure

    By Chad Whalen, Fortinet More businesses than ever are moving their business operations – in part or in whole – to the cloud. An IDG Enterprise study found 69 percent…

  • How to Choose the Right Security Testing Tool

    By Stanislav Breslavskyi and Nazar Tymoshyk, SoftServe Sooner or later, any expert involved in software or computer systems development and maintenance processes will face security questions. To find solutions, they’ll…

  • 5 Free Tools for Compliance Management

    Many organizations must comply with regulations such as HIPAA, and the numbers are growing, fueled by constantly evolving legislation that creates new rules, requirements and auditing procedures. Security compliance requirements are…

  • 4 Lessons Learned from the POODLE Hack

    By Nazar Tymoshyk and Stanislav Breslavskyi The growing list of recent red-letter security vulnerabilities—Beast, Heartbleed, Shellshock—was recently extended with a new threat, POODLE. No matter how fluffy your associations with…


Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies