Address Sanitizer for Bare-metal Firmware
Friday, March 29, 2024
read more..
Google Public DNS’s approach to fight against cache poisoning attacks
Thursday, March 28, 2024
read more..
Real-time, privacy-preserving URL protection
Thursday, March 14, 2024
read more..
Vulnerability Reward Program: 2023 Year in Review
Tuesday, March 12, 2024
read more..
Secure by Design: Google’s Perspective on Memory Safety
Tuesday, March 5, 2024
read more..
Piloting new ways of protecting Android users from financial fraud
Wednesday, February 14, 2024
read more..
Improving Interoperability Between Rust and C++
Monday, February 5, 2024
read more..
UN Cybercrime Treaty Could Endanger Web Security
Friday, February 2, 2024
read more..
Scaling security with AI: from detection to solution
Wednesday, January 31, 2024
read more..
Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager
Tuesday, January 30, 2024
read more..
MiraclePtr: protecting users from use-after-free vulnerabilities on more plat...
Friday, January 12, 2024
read more..
Hardening cellular basebands in Android
Tuesday, December 12, 2023
read more..
Improving Text Classification Resilience and Efficiency with RETVec
Wednesday, November 29, 2023
read more..
Two years later: a baseline that drives up security for the industry
Monday, November 20, 2023
read more..
Evolving the App Defense Alliance
Wednesday, November 8, 2023
read more..
MTE - The promising path forward for memory safety
Wednesday, November 8, 2023
read more..
Qualified certificates with qualified risks
Saturday, November 4, 2023
read more..
More ways for users to identify independently security tested apps on Google ...
Thursday, November 2, 2023
read more..
Increasing transparency in AI security
Thursday, October 26, 2023
read more..
Google’s reward criteria for reporting bugs in AI products
Thursday, October 26, 2023
read more..
Joint Industry statement of support for Consumer IoT Security Principles
Wednesday, October 25, 2023
read more..
Enhanced Google Play Protect real-time scanning for app installs
Wednesday, October 18, 2023
read more..
Scaling BeyondCorp with AI-Assisted Access Control Policies
Wednesday, October 11, 2023
read more..
Bare-metal Rust in Android
Monday, October 9, 2023
read more..
Expanding our exploit reward program to Chrome and Cloud
Friday, October 6, 2023
read more..
Top Enterprise Encryption Products
Wednesday, November 25, 2020
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions. read more..
SASE: Securing the Network Edge
Wednesday, November 25, 2020
Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know. read more..
Kaspersky vs. Bitdefender: EDR Solutions Compared
Tuesday, November 24, 2020
Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing. read more..
Best Antivirus Software for 2020
Thursday, November 12, 2020
What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online. read more..
Disk vs File Encryption: Which Is Best for You?
Saturday, November 7, 2020
Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both. read more..
Best Privileged Access Management (PAM) Software
Saturday, November 7, 2020
Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help read more..
Best IAM Software
Friday, November 6, 2020
IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now. read more..
Microsegmentation: The Core of Zero Trust Security
Saturday, October 24, 2020
Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed. read more..
Best User and Entity Behavior Analytics (UEBA) Tools
Saturday, October 24, 2020
Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now. read more..
VPN Security: How VPNs Work and How to Buy the Best One
Tuesday, October 20, 2020
Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options. read more..
Apple White Hat Hack Shows Value of Pen Testers
Friday, October 16, 2020
An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too. read more..
How to Improve SD-WAN Security
Saturday, October 10, 2020
Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps. read more..
Top Threat Intelligence Platforms for 2020
Saturday, October 10, 2020
We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows. read more..
Top CASB Security Vendors for 2020
Friday, October 9, 2020
CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice. read more..
Employees and Data Backup Top Cybersecurity Awareness Month Concerns
Friday, October 2, 2020
October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start. read more..
CrowdStrike vs Carbon Black: Top EDR Solutions Compared
Tuesday, September 29, 2020
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses. read more..
Top Zero Trust Security Solutions
Friday, September 25, 2020
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products. read more..
Securing Remote Workforce Is Top Security Priority: Gartner
Wednesday, September 16, 2020
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home. read more..
Top Vulnerability Management Software
Friday, September 4, 2020
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools read more..
Best Enterprise Network Security Products
Wednesday, August 5, 2020
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data. read more..
Latest Intelligence for October 2017
Friday, November 10, 2017
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More read more..
Sowbug: Cyber espionage group targets South American and Southeast Asian gove...
Tuesday, November 7, 2017
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More read more..
Ramnit worm: Still turning up in unlikely places
Friday, October 27, 2017
Over 90 Ramnit-infected apps removed from Google Play. Read More read more..
BadRabbit: New strain of ransomware hits Russia and Ukraine
Wednesday, October 25, 2017
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More read more..
Android malware on Google Play adds devices to botnet
Wednesday, October 18, 2017
Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More read more..