Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store. Read More ▶ |
|
| White Paper: Palo Alto Networks As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More ▶ | Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More ▶ |
| Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More ▶ |
| Sometimes, the best defense is awareness. At their core, deception technologies can assist in this process, but what's the difference between a deception vendor and a honey pot? Read More ▶ |
| | Check out these 24 free, standout software tools that will make your daily security work easier. Read More ▶ |
| Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network. Read More ▶ |
| Want your government to stop punishing the security community for its own lapses? Become a better teacher and advocate for what you do. Read More ▶ |
| White Paper: PTC Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|