Micro segmentation is one of the most advanced security methods that organizations can employ to protect critical assets, users, and data from both outside hackers and malicious insiders. But it has to be done right. Find out if GuardiCore Centra is up to the challenge.
Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching the really dangerous, hidden threats before they can strike.
The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.
SecBI has fielded new software that aims to eliminate the burden of processing billions of traffic logs per month manually, and they did it without using any network taps. Come to CSO Magazine to find out how SecBI solved this tricky problem in an exclusive review of the new product.
CSO Magazine is turning up the heat on cybersecurity, diving into reviews of the latest cyber defenses in critical categories as part of a summer reviews blitz. Find out how the latest products in deception, microsegmentation, network traffic analysis and others stack up.
A new type of environmentally aware malware knows how to look for key indicators to prove that its running inside a sandbox. The Minerva tool we tested for CSO Magazine actually feeds it those prompts, tricking the malware to sleep or kill itself.
We tested the Netgear ReadyNAS 314 for BizTech, finding a sturdy workhorse for file storage, that also automatically squashed bugs before they could be permanently written.
New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. Network World asked TWB author John Breeden II to test out several manager programs designed to focus the chaos of a typical firewall deployment.
What if there was a different way to look at security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? Varmour does that. It’s called segmentation, and is the subject of a Network World Clear Test review.