Editorial Staff Blogs
Verdict: Solid vulnerability management tool that could become a bit pricey in a large environment.
Verdict: This one demands your attention. At a very reasonable price point, we make this our Best Buy this month.
Verdict: This is a tool that you can add to your environment almost regardless of what else you are using. It not only plays well with others, such as risk management tools, it is a powerhouse in its own right. Recommended.
SC Media eBook on GRC
This eBook looks at how managing the three legs of the GRC stool will keep a company from violating regulations while reducing risk and improving security.
2016 State of Software Security
This report provides security practitioners with tangible benchmarks with which to measure their own programs. Metrics presented are based on real application risk postures, drawn...
Fragmentation: The "Silent Killer" of Your Security Management Program
Extreme fragmentation of enterprise security is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high. In this paper we’ll lay out a path...
2016 DDoS Attack Trends
DDoS will likely be a problem that is here to stay, but understanding the latest trends can help you be better prepared. This paper explores the growing stateful attacks, and why...