IT Security

IT Security News

Prevent Generative AI Data Leaks with Chrome Enterprise DLP (Thu, 18 Apr 2024)

>> Read More

How we built the new Find My Device network with user security and privacy in mind (Mon, 08 Apr 2024)

>> Read More

Address Sanitizer for Bare-metal Firmware (Thu, 28 Mar 2024)

>> Read More

Google Public DNS’s approach to fight against cache poisoning attacks (Thu, 28 Mar 2024)

>> Read More

Real-time, privacy-preserving URL protection (Thu, 14 Mar 2024)

>> Read More

Vulnerability Reward Program: 2023 Year in Review (Tue, 12 Mar 2024)

>> Read More

Secure by Design: Google’s Perspective on Memory Safety (Mon, 04 Mar 2024)

>> Read More

Piloting new ways of protecting Android users from financial fraud (Wed, 14 Feb 2024)

>> Read More

Improving Interoperability Between Rust and C++ (Mon, 05 Feb 2024)

>> Read More

UN Cybercrime Treaty Could Endanger Web Security (Thu, 01 Feb 2024)

>> Read More

Scaling security with AI: from detection to solution (Wed, 31 Jan 2024)

>> Read More

Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager (Tue, 30 Jan 2024)

>> Read More

MiraclePtr: protecting users from use-after-free vulnerabilities on more platforms (Thu, 11 Jan 2024)

>> Read More

Hardening cellular basebands in Android (Tue, 12 Dec 2023)

>> Read More

Improving Text Classification Resilience and Efficiency with RETVec (Wed, 29 Nov 2023)

>> Read More

Two years later: a baseline that drives up security for the industry (Mon, 20 Nov 2023)

>> Read More

Evolving the App Defense Alliance (Wed, 08 Nov 2023)

>> Read More

MTE - The promising path forward for memory safety (Tue, 07 Nov 2023)

>> Read More

Qualified certificates with qualified risks (Fri, 03 Nov 2023)

>> Read More

More ways for users to identify independently security tested apps on Google Play (Thu, 02 Nov 2023)

>> Read More

Increasing transparency in AI security (Thu, 26 Oct 2023)

>> Read More

Google’s reward criteria for reporting bugs in AI products (Thu, 26 Oct 2023)

>> Read More

Joint Industry statement of support for Consumer IoT Security Principles (Wed, 25 Oct 2023)

>> Read More

Enhanced Google Play Protect real-time scanning for app installs (Wed, 18 Oct 2023)

>> Read More

Scaling BeyondCorp with AI-Assisted Access Control Policies (Tue, 10 Oct 2023)

>> Read More

Top Enterprise Encryption Products (Wed, 25 Nov 2020)
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
>> Read More

SASE: Securing the Network Edge (Tue, 24 Nov 2020)
Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know.
>> Read More

Kaspersky vs. Bitdefender: EDR Solutions Compared (Tue, 24 Nov 2020)
Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing.
>> Read More

Best Antivirus Software for 2020 (Wed, 11 Nov 2020)
What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online.
>> Read More

Disk vs File Encryption: Which Is Best for You? (Sat, 07 Nov 2020)
Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both.
>> Read More

Best Privileged Access Management (PAM) Software (Sat, 07 Nov 2020)
Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help
>> Read More

Best IAM Software (Fri, 06 Nov 2020)
IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now.
>> Read More

Microsegmentation: The Core of Zero Trust Security (Sat, 24 Oct 2020)
Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed.
>> Read More

Best User and Entity Behavior Analytics (UEBA) Tools (Fri, 23 Oct 2020)
Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now.
>> Read More

VPN Security: How VPNs Work and How to Buy the Best One (Tue, 20 Oct 2020)
Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options.
>> Read More

Apple White Hat Hack Shows Value of Pen Testers (Fri, 16 Oct 2020)
An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.
>> Read More

How to Improve SD-WAN Security (Sat, 10 Oct 2020)
Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps.
>> Read More

Top Threat Intelligence Platforms for 2020 (Sat, 10 Oct 2020)
We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows.
>> Read More

Top CASB Security Vendors for 2020 (Fri, 09 Oct 2020)
CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice.
>> Read More

Employees and Data Backup Top Cybersecurity Awareness Month Concerns (Thu, 01 Oct 2020)
October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start.
>> Read More

CrowdStrike vs Carbon Black: Top EDR Solutions Compared (Mon, 28 Sep 2020)
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.
>> Read More

Top Zero Trust Security Solutions (Thu, 24 Sep 2020)
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.
>> Read More

Securing Remote Workforce Is Top Security Priority: Gartner (Tue, 15 Sep 2020)
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home.
>> Read More

Top Vulnerability Management Software (Thu, 03 Sep 2020)
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools
>> Read More

Best Enterprise Network Security Products (Tue, 04 Aug 2020)
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data.
>> Read More

Latest Intelligence for October 2017 (Fri, 10 Nov 2017)
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More
>> Read More

Sowbug: Cyber espionage group targets South American and Southeast Asian governments (Tue, 07 Nov 2017)
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More
>> Read More

Ramnit worm: Still turning up in unlikely places (Fri, 27 Oct 2017)
Over 90 Ramnit-infected apps removed from Google Play. Read More
>> Read More

BadRabbit: New strain of ransomware hits Russia and Ukraine (Wed, 25 Oct 2017)
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More
>> Read More

We are updating news please visit us later…