article thumbnail

To achieve desired security outcomes, update and integrate your tech stack

SC Magazine

A Cisco Systems office building as seen in 2001. Embracing a proactive tech refresh strategy and the integration of technology are two the of most effective security practices that organizations can enact in order to achieve desired outcomes, according to a recently published research study from Cisco Systems and Cyentia Institute. “But

article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

At the same time, WAF technology is increasingly a part of more comprehensive security solutions like next-generation firewalls (NGFW), unified threat management (UTM), and more. From the 1998 MIT Entrepreneurship Competition to today, Akamai Technologies is now a top provider of WAF solutions. Microsoft Azure. Signal Sciences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

AES or the Advanced Encryption Standard was adopted in 2001 by the US National Institute of Standards and Testing (NIST) as the standard for symmetric encryption. The algorithm allows for variable key sizes and variable rounds to increase randomness and security. Currently, the top four algorithms include AES, Blowfish, ECC, and RSA.

article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. This guide evaluates the leading SIEM software solutions in the marketplace, followed by a dive into what SIEM is, how it works, and how to choose a solution.

Software 113
article thumbnail

The U.S. Is Falling Behind on Encryption Standards – And That’s a Global Problem

eSecurity Planet

National Institute of Standards and Technology (NIST) is charged with setting cybersecurity standards and certifying products, yet is woefully behind on both. As quantum computing technology continues to develop, this problem will become a crisis if it can’t be resolved now. We need to have new encryption standards.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Also read : Addressing Remote Desktop Attacks and Security. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black.