9 Top Active Directory Security Tools
Thursday, June 13, 2019

Active Directory can't protect against every security risk. Here are 9 Active Directory security tools that can help. read more..

Improving Security and Privacy for Extensions Users
Wednesday, June 12, 2019

read more..

Use your Android phone’s built-in security key to verify sign-in on iOS devices
Wednesday, June 12, 2019

read more..

Data Storage Security: Best Practices for Security Teams
Friday, June 7, 2019

We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations. read more..

PHA Family Highlights: Triada
Thursday, June 6, 2019

read more..

20 Top UEBA Vendors
Wednesday, June 5, 2019

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We analyze the top UEBA products. read more..

Email Still a Major Attack Vector: Security Research
Monday, June 3, 2019

Email users continue to be one of the easiest marks for cybercriminals, according to the latest cybersecurity research. read more..

IT Security Vulnerability Roundup – May 2019
Friday, May 31, 2019

We take a closer look at 12 highly critical vulnerabilities disclosed in the past month. read more..

One Year into GDPR: What's Changed?
Friday, May 24, 2019

A year after implementation, the European data privacy regulation has improved data handling, but the biggest changes may be yet to come. read more..

How to Run a Threat Hunting Program
Friday, May 17, 2019

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool. read more..

New research: How effective is basic account hygiene at preventing hijacking
Friday, May 17, 2019

read more..

Advisory: Security Issue with Bluetooth Low Energy (BLE) Titan Security Keys
Wednesday, May 15, 2019

read more..

How to Comply with GDPR
Saturday, May 11, 2019

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the data privacy law. read more..

What’s New in Android Q Security
Thursday, May 9, 2019

read more..

Queue the Hardening Enhancements
Thursday, May 9, 2019

read more..

Quantifying Measurable Security
Wednesday, May 8, 2019

read more..

9 Top Network Access Control (NAC) Solutions
Wednesday, May 8, 2019

Network access control is critical for controlling the security of devices that attach to your network. We review nine NAC solutions. read more..

FortiNAC: Network Access Product Overview and Insight
Wednesday, May 8, 2019

Fortinet's network access control (NAC) solution supports 30,000 ports per server and offers real-time automated threat response. read more..

Google CTF 2019 is here
Saturday, May 4, 2019

read more..

From Insiders to Endpoints, Security Risks Remain High: Research
Wednesday, May 1, 2019

Organizations remain under attack both from within and without. We highlight current and emerging risks and the protections organizations need. read more..

IT Security Vulnerability Roundup – April 2019
Tuesday, April 30, 2019

We examine a dozen highly critical vulnerabilities disclosed within the past month. read more..

10 Top Single Sign-On Solutions
Thursday, April 25, 2019

Single sign-on solutions can make access management easier for security teams, and the most sophisticated can adapt as risks change. Here are 10 of the best. read more..

IBM Authentication Solutions: Single Sign-On Overview and Analysis
Thursday, April 25, 2019

We review IBM's single sign-on solutions, the on-premises IBM Security Access Manager (ISAM) and the Cloud Identity IDaaS offering. read more..

ForgeRock Identity Platform: Single Sign-On Overview and Analysis
Thursday, April 25, 2019

We review the ForgeRock Identity Platform, which provides single sign-on (SSO) capabilities as well as other identity and access management features. read more..

Okta Identity Cloud: Single Sign-On Overview and Analysis
Thursday, April 25, 2019

We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations. read more..

Micro Focus Access Manager: Single Sign-On Overview and Analysis
Thursday, April 25, 2019

We review Micro Focus Access Manager, a single sign-on solution available as an appliance, software or cloud-based service. read more..

OneLogin Unified Access Management Platform: Overview and Analysis
Thursday, April 25, 2019

We review OneLogin Unified Access Management Platform, which scales from less than 10 users to more than 100,000. read more..

CA Single Sign-On: Product Overview and Analysis
Thursday, April 25, 2019

We review CA Single Sign-On, which can scale to handle more than 80 million users and 3 billion transactions per month. read more..

Oracle Enterprise Single Sign-On: Product Overview and Analysis
Thursday, April 25, 2019

We review Oracle's two single sign-on solutions, Identity Cloud Service and Access Management, used by some of the world's largest companies. read more..

Better protection against Man in the Middle phishing attacks
Friday, April 19, 2019

read more..

The Android Platform Security Model
Thursday, April 18, 2019

read more..

Gmail making email more secure with MTA-STS standard
Thursday, April 11, 2019

read more..

Android Security & Privacy Year in Review 2018: Keeping two billion users, an...
Friday, March 29, 2019

read more..

Managed Google Play earns key certifications for security and privacy
Thursday, March 21, 2019

read more..

Open-sourcing Sandboxed API
Tuesday, March 19, 2019

read more..

Disclosing vulnerabilities to protect users across platforms
Friday, March 8, 2019

read more..

Android Security Improvement update: Helping developers harden their apps, on...
Friday, March 1, 2019

read more..

Google Play Protect in 2018: New updates to keep Android users secure
Wednesday, February 27, 2019

read more..

How we fought bad apps and malicious developers in 2018
Wednesday, February 13, 2019

read more..

Open sourcing ClusterFuzz
Friday, February 8, 2019

read more..

Introducing Adiantum: Encryption for the Next Billion Users
Thursday, February 7, 2019

read more..

Protect your accounts from data breaches with Password Checkup
Tuesday, February 5, 2019

read more..

PHA Family Highlights: Zen and its cousins
Saturday, January 12, 2019

read more..

Google Public DNS now supports DNS-over-TLS
Thursday, January 10, 2019

read more..

Android Pie à la mode: Security & Privacy
Friday, December 21, 2018

read more..

Latest Intelligence for October 2017
Friday, November 10, 2017

Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More read more..

Sowbug: Cyber espionage group targets South American and Southeast Asian gove...
Tuesday, November 7, 2017

Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More read more..

Ramnit worm: Still turning up in unlikely places
Friday, October 27, 2017

Over 90 Ramnit-infected apps removed from Google Play. Read More read more..

BadRabbit: New strain of ransomware hits Russia and Ukraine
Wednesday, October 25, 2017

BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More read more..

Android malware on Google Play adds devices to botnet
Wednesday, October 18, 2017

Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More read more..

Powered by Feed Informer