article thumbnail

How to Implement Zero Trust

eSecurity Planet

As organizations look to strengthen their network security or update their cybersecurity defenses, the gospel of zero trust awaits. . With the swift adoption of remote work and added difficulty identifying network perimeters, zero trust as a solution is gaining steam. Also Read: Top Zero Trust Security Solutions of 2021 .

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

McAfee has been a major player in security for a long time. This includes antivirus, identity protection, SIEM (where Gartner names it a Leader), endpoint protection (graded a Visionary by Gartner) and secure web gateways (Gartner Challenger). Network security. Cloud access security broker (CASB).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

Any bugs or glitches in its programming leaves noticeable trails for antivirus software to track. As such, there have been several incidents where rootkits have been used to inflict massive amounts of harm to devices and networks. Looking for More Ways to Keep Your Network Safe? Looking for More About Malware?

Firmware 109
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Satori DataSecOps 2021 Private BluBracket Software supply chain 2021 Private Cape Privacy Data security 2021 Private ZecOps Digital forensics 2019 Private SecurityScorecard Risk ratings 2017 Private Carbon Black Security software 2015 Acquired: VMware AVG Antivirus software 2015 Acquired: Avast.

article thumbnail

Weathering Russian Winter: The Current State of Russian APTs

Security Boulevard

Though APTs were regularly seen from then on inside the industry, the term didn’t gain public consciousness until an attack on Google servers in 2010 , the fault of which was assigned to Chinese APTs. Antivirus companies like McAfee jumped on the opportunity to provide anti-APT products. Among them are: Removal from network access.