Wireshark is a highly respected packet capture tool. Find out about this helpful utility and how you would use it.
By Stephen Cooper in Net Admin on February 9, 2023
Kali Linux is a unique package of the Linux operating system and a collection of penetration testing tools. Find out about this free package. 
By Stephen Cooper in Net Admin on May 8, 2024
Both Digital Guardian DLP and CoSoSys Endpoint Protector are leading data loss prevention systems. Which is best for you needs?
By Stephen Cooper in Net Admin on June 13, 2024
Here's what you need to know about Symantec Data Loss Prevention (DLP) solution, including a list of the best alternatives.
By Amakiri Welekwe in Net Admin on August 23, 2023
Having the latest Microsoft Office updates is crucial for ensuring that you’re protected against the latest threats. In this article, we’re going to look at how to update Microsoft Office 365.
By Tim Keary in Net Admin on November 25, 2024
Discover how you can use threat modeling as a strategy to mitigate threats and manage potential security risks.
By Amakiri Welekwe in Net Admin on October 21, 2022
Static code analysis – also known as Static Application Security Testing or SAST – is the process of analyzing computer software without actually running the software. Find out which are the best tools for the job.
By Liku Zelleke in Net Admin on December 9, 2024
PII is protected by legislation in many parts of the world. Find out about tools that will discover and classify this sensitive data.    
By Stephen Cooper in Net Admin on December 17, 2024
PII refers to the information about private individuals that your companies hold, and data privacy standards govern it. Find out how to make standards compliance easy.
By Stephen Cooper in Net Admin on December 17, 2024
Page 49 of 115