IT Security

IT Security News

Improving Site Isolation for Stronger Browser Security (Thu, 17 Oct 2019)

>> Read More

USB-C Titan Security Keys - available tomorrow in the US (Mon, 14 Oct 2019)

>> Read More

Top Penetration Testing Tools (Fri, 04 Oct 2019)
Penetration testing should be an ongoing practice for all IT security teams. Here are the best pen test tools for finding your vulnerabilities.
>> Read More

John the Ripper: Pen Testing Product Overview and Analysis (Fri, 04 Oct 2019)
John the Ripper is a great tool for anyone checking for password vulnerability.
>> Read More

No More Mixed Messages About HTTPS (Thu, 03 Oct 2019)

>> Read More

Aircrack-ng: Pen Testing Product Overview and Analysis (Thu, 03 Oct 2019)
Aircrack-ng is the go-to tool for analyzing and cracking wireless networks.
>> Read More

Wireshark: Pen Testing Product Overview and Analysis (Wed, 02 Oct 2019)
Wireshark is a strong network protocol analyzer, but a pen testing tool is needed to exploit any vulnerabilities.
>> Read More

Chrome UI for Deprecating Legacy TLS Versions (Tue, 01 Oct 2019)

>> Read More

Nmap: Pen Testing Product Overview and Analysis (Mon, 30 Sep 2019)
Nmap is a port scanner more than a penetration testing tool, but it aids pen testing by flagging the best areas to target in an attack.
>> Read More

Fiddler: Pen Testing Product Overview and Analysis (Fri, 27 Sep 2019)
Fiddler is a useful collection of manual tools for dealing with web debugging, web session manipulation, and security and performance testing.
>> Read More

Nessus: Pen Testing Product Overview and Analysis (Thu, 26 Sep 2019)
Nessus is a paid vulnerability assessment tool that is best for experienced security teams, and should be used in conjunction with pen testing tools.
>> Read More

Metasploit: Pen Testing Product Overview and Analysis (Tue, 24 Sep 2019)
Metasploit helps IT security teams find and test vulnerabilities – and analyze the results so remediation steps can be done efficiently.
>> Read More

Burp Vulnerability Scanner: Pen Test Product Overview and Analysis (Tue, 24 Sep 2019)
PortSwigger Web Security's Burp is a top-rated web vulnerability scanner used in many organizations and is found in most penetration testing toolkits.
>> Read More

How Google adopted BeyondCorp: Part 3 (tiered access) (Tue, 17 Sep 2019)

>> Read More

Top Cybersecurity Companies (Fri, 13 Sep 2019)
These IT security vendors lead the market through their innovative offerings, range of products and services, customer satisfaction and annual revenue
>> Read More

Trust but verify attestation with revocation (Fri, 06 Sep 2019)

>> Read More

Expanding bug bounties on Google Play (Thu, 29 Aug 2019)

>> Read More

18 Cyber Security Startups to Watch in 2019 (Wed, 28 Aug 2019)
Here are 18 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.
>> Read More

Protecting Chrome users in Kazakhstan (Wed, 21 Aug 2019)

>> Read More

How Google adopted BeyondCorp: Part 2 (devices) (Tue, 20 Aug 2019)

>> Read More

New Research: Lessons from Password Checkup in action (Thu, 15 Aug 2019)

>> Read More

Making authentication even easier with FIDO2-based local user verification for Google Accounts (Mon, 12 Aug 2019)

>> Read More

Awarding Google Cloud Vulnerability Research (Thu, 08 Aug 2019)

>> Read More

Understanding why phishing attacks are so effective and how to mitigate them (Thu, 08 Aug 2019)

>> Read More

Adopting the Arm Memory Tagging Extension in Android (Fri, 02 Aug 2019)

>> Read More

Titan Security Keys are now available in Canada, France, Japan, and the UK (Thu, 01 Aug 2019)

>> Read More

Top Vulnerability Scanning Tools (Wed, 31 Jul 2019)
Staying on top of vulnerabilities is a critical IT security practice. Here are a dozen vulnerability scanning tools that can help.
>> Read More

Chrome Fuzzer Program Update And How-To (Tue, 30 Jul 2019)

>> Read More

Netskope for SaaS: CASB Product Overview and Insight (Sat, 20 Jul 2019)
We review Netskope's CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
>> Read More

Bitglass Cloud Security: CASB Product Overview and Insight (Fri, 19 Jul 2019)
We review Bitglass Cloud Security, including the CASB's use cases, notable features, security qualifications and supported applications.
>> Read More

Microsoft Cloud App Security: CASB Product Overview and Insight (Fri, 19 Jul 2019)
We review Microsoft Cloud App Security CASB, including the cloud security product's use cases, notable features, security qualifications and supported applications.
>> Read More

Bigger Rewards for Security Bugs (Thu, 18 Jul 2019)

>> Read More

Symantec CloudSOC: CASB Product Overview and Insight (Wed, 10 Jul 2019)
We review Symantec's CloudSOC, CASB technology acquired from Blue Coat Systems and aimed at enterprises with discovery, monitoring and DLP needs.
>> Read More

Proofpoint CASB: Product Overview and Insight (Wed, 10 Jul 2019)
We review Proofpoint CASB, technology acquired from FireLayers that focuses on detecting and stopping threats.
>> Read More

8 Top CASB Vendors (Wed, 10 Jul 2019)
We review 8 top cloud access security broker (CASB) products and break down their use cases, features, technology, delivery, and pricing.
>> Read More

McAfee MVISION Cloud: CASB Product Overview and Insight (Sat, 06 Jul 2019)
We review McAfee's MVISION Cloud, based on CASB technology acquired from Skyhigh Networks.
>> Read More

Cloud Security Requires Visibility, Access Control: Security Research (Tue, 02 Jul 2019)
The cloud can be seen as an opportunity to improve security or as a new class of risk, according to reports released in June.
>> Read More

How Google adopted BeyondCorp (Thu, 27 Jun 2019)

>> Read More

Google Public DNS over HTTPS (DoH) supports RFC 8484 standard (Wed, 26 Jun 2019)

>> Read More

Helping organizations do more without collecting more data (Wed, 19 Jun 2019)

>> Read More

New Chrome Protections from Deception (Tue, 18 Jun 2019)

>> Read More

Improving Security and Privacy for Extensions Users (Wed, 12 Jun 2019)

>> Read More

Use your Android phone’s built-in security key to verify sign-in on iOS devices (Wed, 12 Jun 2019)

>> Read More

PHA Family Highlights: Triada (Thu, 06 Jun 2019)

>> Read More

New research: How effective is basic account hygiene at preventing hijacking (Fri, 17 May 2019)

>> Read More

Latest Intelligence for October 2017 (Fri, 10 Nov 2017)
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More
>> Read More

Sowbug: Cyber espionage group targets South American and Southeast Asian governments (Tue, 07 Nov 2017)
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More
>> Read More

Ramnit worm: Still turning up in unlikely places (Fri, 27 Oct 2017)
Over 90 Ramnit-infected apps removed from Google Play. Read More
>> Read More

BadRabbit: New strain of ransomware hits Russia and Ukraine (Wed, 25 Oct 2017)
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More
>> Read More

We are updating news please visit us later…