Risked Based Security Reveals 2020 Year End Data Breach Report
Risk Based Security today released its 2020 Year End Data Breach QuickView Report. This report covers data breaches publicly disclosed between January 1, 2020, …
Risk Based Security today released its 2020 Year End Data Breach QuickView Report. This report covers data breaches publicly disclosed between January 1, 2020, …
A yet-unknown hacker yesterday exposed nearly 2 million (1.9 million) user records stolen from online photo editing application Pixlr. The stolen data, …
What is ransomware by the numbers? How much of a threat does ransomware constitute for businesses of all sizes in 2021? Here’s what you need to know. …
What are next-generation firewalls? Why do they matter for enterprise cybersecurity and endpoint security in particular? We occasionally define and describe …
What really differentiates user and non-user identities in your network security and identity management? What tools can you deploy to keep both user and …
Often, when we speak of onboarding in a cybersecurity context, we use an identity management lens. However, this isn’t the only lens we can or should use. In …
What is application control? Why does it matter to modern-day endpoint security for businesses of all sizes? More and more businesses rely on applications to …
What is dwell time? Why does it matter for cybersecurity (or why does it keep cybersecurity professionals up at night)? How can a next-generation SIEM solution …
Solutions Review’s listing of the best unified endpoint management solutions is an annual sneak peak of the solution providers included in our Buyer’s …
Solutions Review today is releasing its newly updated 2021 Buyer’s Guide for Biometric Authentication to assist organizations during the research and …