Advancing Protection in Chrome on Android
Tuesday, July 8, 2025
read more..
Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root...
Friday, May 30, 2025
read more..
Tracking the Cost of Quantum Factoring
Friday, May 23, 2025
read more..
What’s New in Android Security and Privacy in 2025
Wednesday, May 14, 2025
read more..
Advanced Protection: Google’s Strongest Security for Mobile Devices
Tuesday, May 13, 2025
read more..
Using AI to stop tech support scams in Chrome
Thursday, May 8, 2025
read more..
Google announces Sec-Gemini v1, a new experimental cybersecurity model
Saturday, April 5, 2025
read more..
Taming the Wild West of ML: Practical Model Signing with Sigstore
Friday, April 4, 2025
read more..
New security requirements adopted by HTTPS certificate industry
Friday, March 28, 2025
read more..
Titan Security Keys now available in more countries
Wednesday, March 26, 2025
read more..
Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for ope...
Monday, March 17, 2025
read more..
Vulnerability Reward Program: 2024 in Review
Saturday, March 8, 2025
read more..
New AI-Powered Scam Detection Features to Help Protect You on Android
Tuesday, March 4, 2025
read more..
Securing tomorrow's software: the need for memory safety standards
Wednesday, February 26, 2025
read more..
How we kept the Google Play & Android app ecosystems safe in 2024
Thursday, January 30, 2025
read more..
How we estimate the risk from prompt injection attacks on AI systems
Wednesday, January 29, 2025
read more..
Android enhances theft protection with Identity Check and expanded features
Thursday, January 23, 2025
read more..
OSV-SCALIBR: A library for Software Composition Analysis
Friday, January 17, 2025
read more..
Google Cloud expands vulnerability detection for Artifact Registry using OSV
Tuesday, December 10, 2024
read more..
Announcing the launch of Vanir: Open-source Security Patch Validation
Thursday, December 5, 2024
read more..
Leveling Up Fuzzing: Finding more vulnerabilities with AI
Wednesday, November 20, 2024
read more..
Retrofitting spatial safety to hundreds of millions of lines of C++
Saturday, November 16, 2024
read more..
Safer with Google: New intelligent, real-time protections on Android to keep ...
Wednesday, November 13, 2024
read more..
5 new protections on Google Messages to help keep you safe
Tuesday, October 22, 2024
read more..
Top Enterprise Encryption Products
Wednesday, November 25, 2020
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions. read more..
SASE: Securing the Network Edge
Wednesday, November 25, 2020
Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know. read more..
Kaspersky vs. Bitdefender: EDR Solutions Compared
Tuesday, November 24, 2020
Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing. read more..
Best Antivirus Software for 2020
Thursday, November 12, 2020
What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online. read more..
Disk vs File Encryption: Which Is Best for You?
Saturday, November 7, 2020
Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both. read more..
Best Privileged Access Management (PAM) Software
Saturday, November 7, 2020
Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help read more..
Best IAM Software
Friday, November 6, 2020
IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now. read more..
Microsegmentation: The Core of Zero Trust Security
Saturday, October 24, 2020
Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed. read more..
Best User and Entity Behavior Analytics (UEBA) Tools
Saturday, October 24, 2020
Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now. read more..
VPN Security: How VPNs Work and How to Buy the Best One
Tuesday, October 20, 2020
Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options. read more..
Apple White Hat Hack Shows Value of Pen Testers
Friday, October 16, 2020
An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too. read more..
How to Improve SD-WAN Security
Saturday, October 10, 2020
Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps. read more..
Top Threat Intelligence Platforms for 2020
Saturday, October 10, 2020
We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows. read more..
Top CASB Security Vendors for 2020
Friday, October 9, 2020
CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice. read more..
Employees and Data Backup Top Cybersecurity Awareness Month Concerns
Friday, October 2, 2020
October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start. read more..
CrowdStrike vs Carbon Black: Top EDR Solutions Compared
Tuesday, September 29, 2020
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses. read more..
Top Zero Trust Security Solutions
Friday, September 25, 2020
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products. read more..
Securing Remote Workforce Is Top Security Priority: Gartner
Wednesday, September 16, 2020
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home. read more..
Top Vulnerability Management Software
Friday, September 4, 2020
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools read more..
Best Enterprise Network Security Products
Wednesday, August 5, 2020
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data. read more..
Latest Intelligence for October 2017
Friday, November 10, 2017
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More read more..
Sowbug: Cyber espionage group targets South American and Southeast Asian gove...
Tuesday, November 7, 2017
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More read more..
Ramnit worm: Still turning up in unlikely places
Friday, October 27, 2017
Over 90 Ramnit-infected apps removed from Google Play. Read More read more..
BadRabbit: New strain of ransomware hits Russia and Ukraine
Wednesday, October 25, 2017
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More read more..
Android malware on Google Play adds devices to botnet
Wednesday, October 18, 2017
Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More read more..
Necurs attackers now want to see your desktop
Tuesday, October 17, 2017
The Necurs botnet is back again, this time spreading a downloader that takes screen grabs of victims’ desktops and reports encountered errors back to the attackers. Read More read more..