Date

Education and Professional Services

Displaying 61 - 90 of 4752

Article

What is an Endpoint?

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.

Article

Ransomware Prevention: What Your Security Architecture Must Do

Ransomware brings operations to a halt – encrypting data and requiring payment to regain access. Architecture can make ransomware prevention real.

Article

Browser Cryptocurrency Mining

Cybercriminals have embraced the anonymous nature of cryptocurrency as a new preferred method of profit.

Article

What Is a Cloud VPN?

A cloud VPN (aka a virtual private network as a service or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.

Article

What is BeyondCorp?

BeyondCorp is a cybersecurity architecture developed at Google which shifts access control from traditional network perimeters to individual devices

Article

What Is Dynamic DNS?

Domain Name System (DNS) or Dynamic DNS? What's the difference and why should you care?

Article

What Is Cloud Data Protection?

Cloud data protection is the practice of securing a company’s data in a cloud environment, wherever that data is located.

Article

What Is Cloud Native?

Cloud native describes an approach to designing, implementing and operating applications while taking advantage of the products offered by CSPs

Article

What Is Cloud Native Security?

Cloud native technologies have rendered traditional models of software development obsolete, doing away with monolithic application architecture

Article

What Is Container Security?

Container architecture changes key security concerns and requirements compared to the old world of legacy applications.

Article

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack or unauthorized access.

Article

What Is DevOps?

DevOps unites Development and Operations teams throughout the entire software delivery process, enabling them to discover and remediate issues faster.

Article

What Is DNS?

DNS is as ubiquitous online as flooring is in your home – so what exactly is it, and why should you care?

Article

What is a Phishing Attack?

Phishing attacks are one of the most prevalent methods of cybercrime because they are easy to deploy and can bypass detection methods.

Article

What Is DNS Tunneling?

DNS tunneling is one of the most damaging DNS attacks. What exactly is it, and how does it work?

Article

What is a Port Scan?

A port scan is a method for determining which ports on a network are open. Port scanning is analogous to knocking on doors to see if someone is home.

Article

What is Spyware?

Spyware is a type of malware (or “malicious software”) that collects and shares information about a computer or network without the user’s consent.

Article

What Is Firewall as a Service?

A firewall in a computer network (hardware, software or both) acts as a barrier to prevent unauthorized access to the network.

Article

Reducing Cybersecurity Risk at the Board Level

The Board of Directors should implement company wide security training, tools, and automation to minimize risk and increase prevention.

Article

What Is IoT Security?

Today, IoT tangibly solves pressing business problems across many industries. Early adopters of this technology are attesting to its many benefits.

Article

What is Cloud Security

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.

Article

What is Malware?

Malware is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.

Article

What Is Endpoint Security?

Endpoint security describes the tools and techniques designed to protect users’ devices and ensure the security of access points to a network

Article

What Is Managed Detection and Response (MDR)?

MDR services offer dedicated personnel and technology to improve the effectiveness of security operations in threat identification and response

Article

What is Microsegmentation?

Microsegmentation is a method of creating zones in data centers and cloud environments to isolate workloads from one another and secure them

Article

What is Microsoft Cloud and How to Safely Migrate To It

Secure migration from physical datacenters onto the Microsoft Azure cloud computing platform requires: access control and streamlined management.

Article

What Is MPLS?

Multiprotocol Label Switching, or MPLS, is a networking technology that routes traffic using the shortest path based on “labels” to handle forwarding

Article

What is Network Security?

Network security is a subgroup of networking involving securing the connected network infrastructure from the core to the edge of the perimeter.

Article

What Is Network Segmentation?

Network segmentation is an architectural approach that divides a network into multiple segments or subnets, each acting as its own small network.

Article

5 Ways Endpoint Security and Network Security Should Work Together

Wrong endpoint security solution can leave your endpoints vulnerable to threats and undo the work that has gone into securing the network.
Displaying 61 - 90 of 4752