SecurityProNews Newsletter Archives 2015
Rule Your Log Data
Hear ye, Hear ye! Our kingdom needs a new ruler to take back control of all the unruly log data. Do you have what it takes to rule your log data? Join us on our conquest to find the greatest rule to rule them all by showcasing your unique rules!
Are you thinking like a cybercriminal?
NEWSFLASH: Cybercriminals aren't stupid! To keep your network secure, you need to think like them.
Take a Look At How Various Industries View Security
Biscom shared some results of a new IT Survey finding that although regulated industries say security is a high concern, many are still using solutions that are inadequate for protecting their data.
Obama Signed Executive Order To Go After Cyber-Attackers
Today, President Obama signed an executive order that will allow the US government to go after those who perpetrate cyber attacks with sanctions
The Best Form of Web Application Security Scans
Automatic versus manual. A heavily debated subject whatever you speak of, and it is no different in the web application security industry. Should you do a manual penetration test or automatically scan all your websites with an automated web application security scanner? With which process you would find most vulnerabilities and which one has the best return on investment?
Email security, continuity & archiving in one! Free Trial
ControlEmail offers email security, continuity and archiving in one single, cloud-based solution. Easy to set up and easy to maintain, your business will be protected from email bourne viruses in minutes.