HomeCybersecurity

Cybersecurity

Five Benefits of Data Endpoint Visibility

As teams worldwide embrace cloud-native architectures--replacing waterfall releases with CI/CD, monolith applications with multiple layers of microservices, and singular databases with data meshes--real-time visibility across these...

How Sectigo Web Security Brings Unified Protection to Web-Facing SMBs

Cybersecurity is becoming something that everybody needs but no one wants to be responsible for. Nowhere is this more true than in the world...

#eWEEKchat Tuesday, Nov. 10: New Tech to Expect in 2021

On Tuesday, Nov. 10, at 11 a.m. PDT/2 p.m. EDT/7 p.m. GMT, @eWEEKNews will host its 92nd monthly #eWEEKChat. The topic will be  "New...

Securing the Elections Is Probably Not What You Think It Is

When I talk with potential voters about election security, the most common fear is that someone, probably the Russians, will hack their local election...

Cisco Systems Brings Some Muscle to SD-WAN

Edge router market share leader Cisco Systems this week announced a new line of infrastructure to address the changing needs of the SD-WANs and...

Why Ping Identity’s Acquisition of ShoCard May Preview Future of Security

Denver-based Ping Identity, which specializes in intelligent identity software, made official on Oct. 6 that it is acquiring personal identity management platform maker ShoCard...

Why XDR Has Emerged as an Important New Security Trend

The shortfall of skilled security professionals and the exponential growth of security-related data means greater risk for companies. Security teams at organizations of all...

How to Innovate Securely with Emerging IT

Future growth depends on continuous innovation with emerging technologies such as artificial intelligence (AI), 5G, quantum computing and extended reality (XR). But how can...

How to Secure the Enterprise of Things

The enterprise and the IT powering it are boosting productivity to new levels. While we used to have manual processes for accounting, sales and...

How Veritas Is Shining a Light Into Dark Data

Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...