Address Sanitizer for Bare-metal Firmware
Friday, March 29, 2024

read more..

Google Public DNS’s approach to fight against cache poisoning attacks
Thursday, March 28, 2024

read more..

Real-time, privacy-preserving URL protection
Thursday, March 14, 2024

read more..

Vulnerability Reward Program: 2023 Year in Review
Tuesday, March 12, 2024

read more..

Secure by Design: Google’s Perspective on Memory Safety
Tuesday, March 5, 2024

read more..

Piloting new ways of protecting Android users from financial fraud
Wednesday, February 14, 2024

read more..

Improving Interoperability Between Rust and C++
Monday, February 5, 2024

read more..

UN Cybercrime Treaty Could Endanger Web Security
Friday, February 2, 2024

read more..

Scaling security with AI: from detection to solution
Wednesday, January 31, 2024

read more..

Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager
Tuesday, January 30, 2024

read more..

MiraclePtr: protecting users from use-after-free vulnerabilities on more plat...
Friday, January 12, 2024

read more..

Hardening cellular basebands in Android
Tuesday, December 12, 2023

read more..

Improving Text Classification Resilience and Efficiency with RETVec
Wednesday, November 29, 2023

read more..

Two years later: a baseline that drives up security for the industry
Monday, November 20, 2023

read more..

Evolving the App Defense Alliance
Wednesday, November 8, 2023

read more..

MTE - The promising path forward for memory safety
Wednesday, November 8, 2023

read more..

Qualified certificates with qualified risks
Saturday, November 4, 2023

read more..

More ways for users to identify independently security tested apps on Google ...
Thursday, November 2, 2023

read more..

Increasing transparency in AI security
Thursday, October 26, 2023

read more..

Google’s reward criteria for reporting bugs in AI products
Thursday, October 26, 2023

read more..

Joint Industry statement of support for Consumer IoT Security Principles
Wednesday, October 25, 2023

read more..

Enhanced Google Play Protect real-time scanning for app installs
Wednesday, October 18, 2023

read more..

Scaling BeyondCorp with AI-Assisted Access Control Policies
Wednesday, October 11, 2023

read more..

Bare-metal Rust in Android
Monday, October 9, 2023

read more..

Expanding our exploit reward program to Chrome and Cloud
Friday, October 6, 2023

read more..

Top Enterprise Encryption Products
Wednesday, November 25, 2020

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions. read more..

SASE: Securing the Network Edge
Wednesday, November 25, 2020

Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know. read more..

Kaspersky vs. Bitdefender: EDR Solutions Compared
Tuesday, November 24, 2020

Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing. read more..

Best Antivirus Software for 2020
Thursday, November 12, 2020

What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online. read more..

Disk vs File Encryption: Which Is Best for You?
Saturday, November 7, 2020

Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both. read more..

Best Privileged Access Management (PAM) Software
Saturday, November 7, 2020

Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help read more..

Best IAM Software
Friday, November 6, 2020

IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now. read more..

Microsegmentation: The Core of Zero Trust Security
Saturday, October 24, 2020

Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed. read more..

Best User and Entity Behavior Analytics (UEBA) Tools
Saturday, October 24, 2020

Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now. read more..

VPN Security: How VPNs Work and How to Buy the Best One
Tuesday, October 20, 2020

Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options. read more..

Apple White Hat Hack Shows Value of Pen Testers
Friday, October 16, 2020

An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too. read more..

How to Improve SD-WAN Security
Saturday, October 10, 2020

Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps. read more..

Top Threat Intelligence Platforms for 2020
Saturday, October 10, 2020

We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows. read more..

Top CASB Security Vendors for 2020
Friday, October 9, 2020

CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice. read more..

Employees and Data Backup Top Cybersecurity Awareness Month Concerns
Friday, October 2, 2020

October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start. read more..

CrowdStrike vs Carbon Black: Top EDR Solutions Compared
Tuesday, September 29, 2020

We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses. read more..

Top Zero Trust Security Solutions
Friday, September 25, 2020

With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products. read more..

Securing Remote Workforce Is Top Security Priority: Gartner
Wednesday, September 16, 2020

Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home. read more..

Top Vulnerability Management Software
Friday, September 4, 2020

Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools read more..

Best Enterprise Network Security Products
Wednesday, August 5, 2020

Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data. read more..

Latest Intelligence for October 2017
Friday, November 10, 2017

Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More read more..

Sowbug: Cyber espionage group targets South American and Southeast Asian gove...
Tuesday, November 7, 2017

Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More read more..

Ramnit worm: Still turning up in unlikely places
Friday, October 27, 2017

Over 90 Ramnit-infected apps removed from Google Play. Read More read more..

BadRabbit: New strain of ransomware hits Russia and Ukraine
Wednesday, October 25, 2017

BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More read more..

Android malware on Google Play adds devices to botnet
Wednesday, October 18, 2017

Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More read more..

Powered by Feed Informer