Data Breach
Max Metzger,
Jan 19, 2017
The Trump Presidency's new cyber tsar, former New York Mayor Rudy Giuliani has had his passwords leaked online along with a whole host of top officials

Network Security News
Also in this feature

Product Reviews

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict This one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.

LockPath Keylight Platform

Verdict: Solid, hard-core GRC.

Acuity Risk Management STREAM Integrated Risk Manager

Verdict: Solid, versatile risk management tool that can fit organizations of just about any size – from the single consultant to large enterprises.

AlgoSec Security Management Solution

Verdict: This is an excellent tool, especially for mid- to large-sized organizations. It has everything you need and is comfortably manageable. We compare it to a sailboat – even though it’s fairly large and complex, can be sailed effectively by a single person.


The DomainTools Report Supplement: Malicious Domain Affix Patterns

Learn from patterns in domain names themselves to calculate their “signal strength” as an indication of nefarious activity with a focus on affixes in malware, phishing, and spam techniques...

DNS Shield Network: Reengineering the Internet

DDoS attacks, breaches, and website downtime has everybody on edge; but it doesn't have to. Download this whitepaper to learn how to reengineer the internet to make it safer, faster...

Gartner: DevSecOps - How to Seamlessly Integrate Security into DevOps

Research has shown that DevOps is becoming increasingly common among organizations, with security integration an important next step. This Gartner report explains the best practices...

Considerations for Corporate Legal Teams Managing E-Discovery

This webinar will share considerations to will help in-house corporate legal teams navigate the process and illustrate the opportunities and risks cloud data brings and effectively...

Sponsored Links