Protecting Chrome users in Kazakhstan
Wednesday, August 21, 2019

read more..

How Google adopted BeyondCorp: Part 2 (devices)
Tuesday, August 20, 2019

read more..

New Research: Lessons from Password Checkup in action
Thursday, August 15, 2019

read more..

Top Penetration Testing Tools
Wednesday, August 14, 2019

Penetration testing should be an ongoing practice for all IT security teams. Here are the best pen test tools for finding your vulnerabilities. read more..

Making authentication even easier with FIDO2-based local user verification fo...
Monday, August 12, 2019

read more..

Awarding Google Cloud Vulnerability Research
Friday, August 9, 2019

read more..

Understanding why phishing attacks are so effective and how to mitigate them
Thursday, August 8, 2019

read more..

Adopting the Arm Memory Tagging Extension in Android
Friday, August 2, 2019

read more..

Titan Security Keys are now available in Canada, France, Japan, and the UK
Thursday, August 1, 2019

read more..

Top Vulnerability Scanning Tools
Wednesday, July 31, 2019

Staying on top of vulnerabilities is a critical IT security practice. Here are a dozen vulnerability scanning tools that can help. read more..

Chrome Fuzzer Program Update And How-To
Tuesday, July 30, 2019

read more..

Netskope for SaaS: CASB Product Overview and Insight
Saturday, July 20, 2019

We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications. read more..

Bitglass Cloud Security: CASB Product Overview and Insight
Saturday, July 20, 2019

We review Bitglass Cloud Security, including the CASB's use cases, notable features, security qualifications and supported applications. read more..

Microsoft Cloud App Security: CASB Product Overview and Insight
Saturday, July 20, 2019

We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications. read more..

Bigger Rewards for Security Bugs
Thursday, July 18, 2019

read more..

Symantec CloudSOC: CASB Product Overview and Insight
Thursday, July 11, 2019

We review Symantec's CloudSOC, CASB technology acquired from Blue Coat Systems and aimed at enterprises with discovery, monitoring and DLP needs. read more..

Proofpoint CASB: Product Overview and Insight
Thursday, July 11, 2019

We review Proofpoint CASB, technology acquired from FireLayers that focuses on detecting and stopping threats. read more..

8 Top CASB Vendors
Thursday, July 11, 2019

We review 8 top cloud access security broker (CASB) products and break down their use cases, features, technology, delivery, and pricing. read more..

McAfee MVISION Cloud: CASB Product Overview and Insight
Saturday, July 6, 2019

We review McAfee's MVISION Cloud, based on CASB technology acquired from Skyhigh Networks. read more..

Cloud Security Requires Visibility, Access Control: Security Research
Wednesday, July 3, 2019

The cloud can be seen as an opportunity to improve security or as a new class of risk, according to reports released in June. read more..

IT Security Vulnerability Roundup – June 2019
Friday, June 28, 2019

We examine a dozen of the most critical security flaws disclosed within the past month. read more..

How Google adopted BeyondCorp
Thursday, June 27, 2019

read more..

Google Public DNS over HTTPS (DoH) supports RFC 8484 standard
Wednesday, June 26, 2019

read more..

Gartner's Top IT Security Projects for 2019
Saturday, June 22, 2019

Which IT security projects deliver the most value and protection from risk? Gartner analysts offer their views. read more..

Helping organizations do more without collecting more data
Wednesday, June 19, 2019

read more..

New Chrome Protections from Deception
Tuesday, June 18, 2019

read more..

9 Top Active Directory Security Tools
Thursday, June 13, 2019

Active Directory can't protect against every security risk. Here are 9 Active Directory security tools that can help. read more..

Improving Security and Privacy for Extensions Users
Wednesday, June 12, 2019

read more..

Use your Android phone’s built-in security key to verify sign-in on iOS devices
Wednesday, June 12, 2019

read more..

Data Storage Security: Best Practices for Security Teams
Friday, June 7, 2019

We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations. read more..

PHA Family Highlights: Triada
Thursday, June 6, 2019

read more..

20 Top UEBA Vendors
Wednesday, June 5, 2019

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We analyze the top UEBA products. read more..

Email Still a Major Attack Vector: Security Research
Monday, June 3, 2019

Email users continue to be one of the easiest marks for cybercriminals, according to the latest cybersecurity research. read more..

IT Security Vulnerability Roundup – May 2019
Friday, May 31, 2019

We take a closer look at 12 highly critical vulnerabilities disclosed in the past month. read more..

One Year into GDPR: What's Changed?
Friday, May 24, 2019

A year after implementation, the European data privacy regulation has improved data handling, but the biggest changes may be yet to come. read more..

How to Run a Threat Hunting Program
Friday, May 17, 2019

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool. read more..

New research: How effective is basic account hygiene at preventing hijacking
Friday, May 17, 2019

read more..

Advisory: Security Issue with Bluetooth Low Energy (BLE) Titan Security Keys
Wednesday, May 15, 2019

read more..

How to Comply with GDPR
Saturday, May 11, 2019

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the data privacy law. read more..

What’s New in Android Q Security
Thursday, May 9, 2019

read more..

Queue the Hardening Enhancements
Thursday, May 9, 2019

read more..

Quantifying Measurable Security
Wednesday, May 8, 2019

read more..

Google CTF 2019 is here
Saturday, May 4, 2019

read more..

Better protection against Man in the Middle phishing attacks
Friday, April 19, 2019

read more..

The Android Platform Security Model
Thursday, April 18, 2019

read more..

Latest Intelligence for October 2017
Friday, November 10, 2017

Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More read more..

Sowbug: Cyber espionage group targets South American and Southeast Asian gove...
Tuesday, November 7, 2017

Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More read more..

Ramnit worm: Still turning up in unlikely places
Friday, October 27, 2017

Over 90 Ramnit-infected apps removed from Google Play. Read More read more..

BadRabbit: New strain of ransomware hits Russia and Ukraine
Wednesday, October 25, 2017

BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More read more..

Android malware on Google Play adds devices to botnet
Wednesday, October 18, 2017

Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More read more..

Powered by Feed Informer