IT Security
IT Security News
Prevent Generative AI Data Leaks with Chrome Enterprise DLP (Thu, 18 Apr 2024)>> Read More
How we built the new Find My Device network with user security and privacy in mind (Mon, 08 Apr 2024)
>> Read More
Address Sanitizer for Bare-metal Firmware (Thu, 28 Mar 2024)
>> Read More
Google Public DNS’s approach to fight against cache poisoning attacks (Thu, 28 Mar 2024)
>> Read More
Real-time, privacy-preserving URL protection (Thu, 14 Mar 2024)
>> Read More
Vulnerability Reward Program: 2023 Year in Review (Tue, 12 Mar 2024)
>> Read More
Secure by Design: Google’s Perspective on Memory Safety (Mon, 04 Mar 2024)
>> Read More
Piloting new ways of protecting Android users from financial fraud (Wed, 14 Feb 2024)
>> Read More
Improving Interoperability Between Rust and C++ (Mon, 05 Feb 2024)
>> Read More
UN Cybercrime Treaty Could Endanger Web Security (Thu, 01 Feb 2024)
>> Read More
Scaling security with AI: from detection to solution (Wed, 31 Jan 2024)
>> Read More
Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager (Tue, 30 Jan 2024)
>> Read More
MiraclePtr: protecting users from use-after-free vulnerabilities on more platforms (Thu, 11 Jan 2024)
>> Read More
Hardening cellular basebands in Android (Tue, 12 Dec 2023)
>> Read More
Improving Text Classification Resilience and Efficiency with RETVec (Wed, 29 Nov 2023)
>> Read More
Two years later: a baseline that drives up security for the industry (Mon, 20 Nov 2023)
>> Read More
Evolving the App Defense Alliance (Wed, 08 Nov 2023)
>> Read More
MTE - The promising path forward for memory safety (Tue, 07 Nov 2023)
>> Read More
Qualified certificates with qualified risks (Fri, 03 Nov 2023)
>> Read More
More ways for users to identify independently security tested apps on Google Play (Thu, 02 Nov 2023)
>> Read More
Increasing transparency in AI security (Thu, 26 Oct 2023)
>> Read More
Google’s reward criteria for reporting bugs in AI products (Thu, 26 Oct 2023)
>> Read More
Joint Industry statement of support for Consumer IoT Security Principles (Wed, 25 Oct 2023)
>> Read More
Enhanced Google Play Protect real-time scanning for app installs (Wed, 18 Oct 2023)
>> Read More
Scaling BeyondCorp with AI-Assisted Access Control Policies (Tue, 10 Oct 2023)
>> Read More
Top Enterprise Encryption Products (Wed, 25 Nov 2020)
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
>> Read More
SASE: Securing the Network Edge (Tue, 24 Nov 2020)
Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know.
>> Read More
Kaspersky vs. Bitdefender: EDR Solutions Compared (Tue, 24 Nov 2020)
Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing.
>> Read More
Best Antivirus Software for 2020 (Wed, 11 Nov 2020)
What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online.
>> Read More
Disk vs File Encryption: Which Is Best for You? (Sat, 07 Nov 2020)
Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both.
>> Read More
Best Privileged Access Management (PAM) Software (Sat, 07 Nov 2020)
Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help
>> Read More
Best IAM Software (Fri, 06 Nov 2020)
IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now.
>> Read More
Microsegmentation: The Core of Zero Trust Security (Sat, 24 Oct 2020)
Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed.
>> Read More
Best User and Entity Behavior Analytics (UEBA) Tools (Fri, 23 Oct 2020)
Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now.
>> Read More
VPN Security: How VPNs Work and How to Buy the Best One (Tue, 20 Oct 2020)
Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options.
>> Read More
Apple White Hat Hack Shows Value of Pen Testers (Fri, 16 Oct 2020)
An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.
>> Read More
How to Improve SD-WAN Security (Sat, 10 Oct 2020)
Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps.
>> Read More
Top Threat Intelligence Platforms for 2020 (Sat, 10 Oct 2020)
We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows.
>> Read More
Top CASB Security Vendors for 2020 (Fri, 09 Oct 2020)
CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice.
>> Read More
Employees and Data Backup Top Cybersecurity Awareness Month Concerns (Thu, 01 Oct 2020)
October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start.
>> Read More
CrowdStrike vs Carbon Black: Top EDR Solutions Compared (Mon, 28 Sep 2020)
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.
>> Read More
Top Zero Trust Security Solutions (Thu, 24 Sep 2020)
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.
>> Read More
Securing Remote Workforce Is Top Security Priority: Gartner (Tue, 15 Sep 2020)
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home.
>> Read More
Top Vulnerability Management Software (Thu, 03 Sep 2020)
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools
>> Read More
Best Enterprise Network Security Products (Tue, 04 Aug 2020)
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data.
>> Read More
Latest Intelligence for October 2017 (Fri, 10 Nov 2017)
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More
>> Read More
Sowbug: Cyber espionage group targets South American and Southeast Asian governments (Tue, 07 Nov 2017)
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More
>> Read More
Ramnit worm: Still turning up in unlikely places (Fri, 27 Oct 2017)
Over 90 Ramnit-infected apps removed from Google Play. Read More
>> Read More
BadRabbit: New strain of ransomware hits Russia and Ukraine (Wed, 25 Oct 2017)
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More
>> Read More
We are updating news please visit us later…