Katelyn Dunn, Author at SC Media

Katelyn Dunn

Most recent articles by Katelyn Dunn

October product reviews: Risk management

This month we take another look at risk management tools, a group that is evolving and continuing the trend of adding new features and taking interesting approaches like dramatically increased automation. In our view, automation is a crucial component of these risk management solutions since adequately and efficiently conducting risk management has exceeded the scope…

September product reviews: Threat Intelligence

It seems every month SC Labs talks about the growing connectivity of the world and the growing threat landscape alongside the growing the need for security professionals to have the information necessary to stay ahead of these attacks. Products in the threat intelligence space, which we revisit this month, provide information to help organizations gain…

August product reviews: Deception network tools

This month, SC Labs takes another look at deception network tools. With the rapid developments and improvements seen in this space, it felt like we were looking at some of these products for the very first time. Deception network tools implement machine learning technology that studies an environment and accompanying assets to create decoy assets,…

Endpoint security

This space has seen tremendous development as endpoint security moves from a single point of protection to safeguarding many endpoints across multiple networks, says Katelyn Dunn. Today’s security tools must meet the demands of an ever-growing cyber landscape and evolving threats   coupled with expansive network infrastructures and hybrid architectures. The journey from the single point…

June 2019 Product Reviews – Vulnerability Management

This month, SC Labs revisited the vulnerability management space and reviewed a handful of solutions. Vulnerability management tools have become an important aspect of the security process. Through scanning an environment and penetration testing, they reveal where vulnerabilities exist and what could potentially be the results of their exploitation. Having one of these products in…