Category: eSecurity Planet

How to Secure the 5 Cloud Environment Types

Each cloud environment has its own security risks that deserve their own processes and solutions. The post How to Secure the 5 Cloud Environment Types appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

How to Secure the 5 Cloud Environment Types

Each cloud environment has its own security risks that deserve their own processes and solutions. The post How to Secure the 5 Cloud Environment Types appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Whitelisting vs Blacklisting: How Are They Different?

Trying to decide whether to whitelist or blacklist IPs or apps for network security? Discover what the differences are and why you should probably do both. The post Whitelisting vs Blacklisting: How Are They Different? appeared first on eSecurity Planet.…

Tagged vs Untagged VLAN: When You Should Use Each

Virtual local area networks (VLANs) are one of the most important networking innovations of the last 30 years, enabling organizations of all sizes to expand or specialize their operations with virtually segmented networking groups and operations. VLANs have made it…

Multi-Tenancy Cloud Security: Definition & Best Practices

Cloud service providers often share resources among multiple organizations to make cloud services more cost-effective and efficient. This shared environment is known as multi-tenancy. Multi-tenant cloud environments can present greater security challenges than dedicated private cloud environments, and as with…

How to Write a Pentesting Report – With Checklist

Learn how to write a penetration testing report with this step-by-step guide and downloadable examples. The post How to Write a Pentesting Report – With Checklist appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…