IT Security

IT Security News

CrowdStrike vs Carbon Black: Top EDR Solutions Compared (Mon, 28 Sep 2020)
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.
>> Read More

Top Zero Trust Security Solutions (Thu, 24 Sep 2020)
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.
>> Read More

Lockscreen and Authentication Improvements in Android 11 (Tue, 22 Sep 2020)

>> Read More

Improved malware protection for users in the Advanced Protection Program (Wed, 16 Sep 2020)

>> Read More

Securing Remote Workforce Is Top Security Priority: Gartner (Tue, 15 Sep 2020)
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home.
>> Read More

Top Vulnerability Management Software (Thu, 03 Sep 2020)
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools
>> Read More

Announcing new reward amounts for abuse risk researchers (Tue, 01 Sep 2020)

>> Read More

Pixel 4a is the first device to go through ioXt at launch (Mon, 10 Aug 2020)

>> Read More

Best Enterprise Network Security Products (Tue, 04 Aug 2020)
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data.
>> Read More

Towards native security defenses for the web ecosystem (Wed, 22 Jul 2020)

>> Read More

Top SIEM Products (Wed, 01 Jul 2020)
We review and compare 11 top SIEM products that can help you manage your IT security environment from a single tool, plus 4 other vendors to consider.
>> Read More

System hardening in Android 11 (Tue, 30 Jun 2020)

>> Read More

11 Weeks of Android: Privacy and Security (Mon, 29 Jun 2020)

>> Read More

Top Full Disk Encryption Software Products (Fri, 05 Jun 2020)
Full disk encryption is a critical part of IT security. Here are the top disk encryption tools to choose from.
>> Read More

Top Endpoint Detection and Response (EDR) Solutions (Fri, 05 Jun 2020)
Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors.
>> Read More

Making the Advanced Protection Program and Titan Security Keys easier to use on Apple iOS devices (Wed, 03 Jun 2020)

>> Read More

The Advanced Protection Program comes to Google Nest (Mon, 01 Jun 2020)

>> Read More

Expanding our work with the open source security community (Thu, 28 May 2020)

>> Read More

Enhanced Safe Browsing Protection now available in Chrome (Tue, 19 May 2020)

>> Read More

Introducing portability of Google Authenticator 2SV codes across Android devices (Fri, 08 May 2020)

>> Read More

Research Grants to support Google VRP Bug Hunters during COVID-19 (Mon, 20 Apr 2020)

>> Read More

Introducing our new book “Building Secure and Reliable Systems” (Wed, 08 Apr 2020)

>> Read More

Announcing our first GCP VRP Prize winner and updates to 2020 program (Wed, 11 Mar 2020)

>> Read More

Top Cybersecurity Employee Training Programs (Tue, 10 Mar 2020)
Employees are the weakest part of your cybersecurity defenses; here are 9 top security training vendors that can help.
>> Read More

How Google Play Protect kept users safe in 2019 (Tue, 10 Mar 2020)

>> Read More

How Google does certificate lifecycle management (Tue, 10 Mar 2020)

>> Read More

FuzzBench: Fuzzer Benchmarking as a Service (Mon, 02 Mar 2020)

>> Read More

20 Vendors Making News at RSA Conference 2020 (Fri, 28 Feb 2020)
From new startups to established companies, a range of new and updated cybersecurity technologies were announced at RSA Conference 2020.
>> Read More

Helping Developers with Permission Requests (Thu, 27 Feb 2020)

>> Read More

Data Encryption on Android with Jetpack Security (Wed, 26 Feb 2020)

>> Read More

Improving Malicious Document Detection in Gmail with Deep Learning (Tue, 25 Feb 2020)

>> Read More

Disruptive ads enforcement and our new approach (Thu, 20 Feb 2020)

>> Read More

Titan Security Keys - now available in Austria, Canada, France, Germany, Italy, Japan, Spain, Switzerland, and the UK (Tue, 18 Feb 2020)

>> Read More

How we fought bad apps and malicious developers in 2019 (Wed, 12 Feb 2020)

>> Read More

Top Data Loss Prevention (DLP) Solutions (Wed, 12 Feb 2020)
DLP tools are a top IT spending priority because of their ability to protect sensitive data. Here are 8 of the best DLP solutions.
>> Read More

Protecting users from insecure downloads in Google Chrome (Thu, 06 Feb 2020)

>> Read More

Top Cloud Security Companies (Wed, 29 Jan 2020)
Cloud computing has brought enormous benefits - and risks. Here are the vendors leading the way with state-of-the-art cloud security products.
>> Read More

18 Hot Cybersecurity Startups for 2020 (Thu, 16 Jan 2020)
Here are 18 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.
>> Read More

Top Cybersecurity Companies (Fri, 03 Jan 2020)
These IT security vendors lead the market through their innovative offerings, range of products and services, customer satisfaction and annual revenue
>> Read More

IT Security Employment Outlook 2020: Jobs, Compensation Plentiful (Sat, 21 Dec 2019)
2020 promises to be another strong year in the cybersecurity jobs market. Here are the security skills that will be most in demand.
>> Read More

Edge Security: How to Secure the Edge of the Network (Thu, 12 Dec 2019)
Edge computing has created new security challenges. We offer an overview of edge security and the top vendors who can help.
>> Read More

IT Security Outlook 2020: The Security Arms Race Escalates (Fri, 06 Dec 2019)
Sophisticated cyberattacks will be met with innovative solutions from security vendors, and CCPA will keep compliance issues in the forefront.
>> Read More

How to Comply with CCPA (Wed, 20 Nov 2019)
The California Consumer Privacy Act takes effect in a little more than a month. Here's what you need to do to be ready for the new data privacy law.
>> Read More

Compliance and Data Privacy Regs IT Security Pros Should Worry About (Wed, 20 Nov 2019)
GDPR is the latest compliance and data privacy reg to affect IT security. We list many more – along with legal issues and GRC solutions to consider.
>> Read More

Top Application Security Products (Mon, 04 Nov 2019)
Application security is a widespread problem. These security tools can help find and fix application vulnerabilities before hackers exploit them.
>> Read More

John the Ripper: Pen Testing Product Overview and Analysis (Fri, 04 Oct 2019)
John the Ripper is a great tool for anyone checking for password vulnerability.
>> Read More

Latest Intelligence for October 2017 (Fri, 10 Nov 2017)
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More
>> Read More

Sowbug: Cyber espionage group targets South American and Southeast Asian governments (Tue, 07 Nov 2017)
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More
>> Read More

Ramnit worm: Still turning up in unlikely places (Fri, 27 Oct 2017)
Over 90 Ramnit-infected apps removed from Google Play. Read More
>> Read More

We are updating news please visit us later…