New & Notable


Risk assessments for a small to medium-sized business

Despite popular belief, a small to medium-sized business can be a target of cybercriminals because of limited security. Expert Mike O. Villegas advises SMBs on security defenses.


WordPress SSL free by default for hosted sites

Customers with hosted sites will now have WordPress SSL turned on for free by default, thanks to Let's Encrypt certificates, potentially making a large number of websites more secure.

Get Started

It's the end of PCI DSS as we know it

Does PCI DSS 3.2 mark the end of major updates to payment security compliance standards? Expert Mike Chapple discusses the update and what it means for organizations.


How to detect an enterprise intrusion

Detecting network intrusions requires a plethora of information. Expert Kevin Beaver explains why security teams need to take a big picture view of the network.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Midmarket IT Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Midmarket IT Security Basics

  • Get Started

    unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  • Get Started

    endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • Get Started

    IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

View All Get Started