Authors
Posts by Chad Kime
thumbnail
Chad Kime

Chad Kime

Lead Writer
What Is a Next-Generation Firewall?
Feb 9, 2024
VulnRecap 1/29/24 – Apple, Apache & VMware Under Attack
Jan 29, 2024
Why BYOD Is the Favored Ransomware Backdoor
Jan 11, 2024
Strong Encryption Explained: 6 Encryption Best Practices
Jan 9, 2024
VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities
Jan 8, 2024
8 Types of Firewalls Explained & When to Use Each
Jan 4, 2024
How to Prevent DNS Attacks: DNS Security Best Practices
Dec 8, 2023
Types of Encryption, Methods & Use Cases
Dec 7, 2023
What Is DNS Security? Everything You Need to Know
Nov 10, 2023
Whitelisting vs Blacklisting: How Are They Different?
Nov 3, 2023
How to Write a Pentesting Report – With Checklist
Oct 31, 2023
Weekly Vulnerability Recap – October 30, 2023 – Citrix & Cisco Haunted by Vulnerabilities
Oct 30, 2023
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.