Endpoint

Ethereum Blockchain Powers Vault One Password Service

Ethereum has gained in popularity over the course of 2017, growing along...

Microsoft Patches 19 Critical Vulnerabilities in July Patch Tuesday Update

Microsoft released its latest monthly Patch Tuesday update on July 11, patching a...

BYOD Blamed for Massive Cryptocurrency Breach

The personal information of about 30,000 customers of the South Korean cryptocurrency exchange Bithumb...

Symantec to Acquire Web Threat Isolation Startup Fireglass

As much as they have helped revolutionize how the world conducts business,...

63 Percent of Companies Can’t Monitor Devices Off the Corporate Network

A recent Ponemon Institute survey of more than 550 IT and IT security practitioners found that 63 percent of respondents can't monitor...

AlertSec Aims to Make Encryption Security More Accessible

Ebba Blitz isn't a typical technology industry CEO, and the company she leads isn't a typical security vendor either. Blitz joined AlertSec...

Comodo cWatch Review & Download

Comodo's proactive security platforms have evolved to such an extent that it can...

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

No one can deny that enterprise endpoints must be protected. After all, most malware...

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

Some vendors respond to security issues faster than others. Last week, the 10th annual Pwn2own hacking challenge was hosted by Trend Micro's...

Google Patches 36 Vulnerabilities in Chrome 57

Google released its latest incremental milestone of the popular Chrome web browser on March 9, with Chrome 57.0.2987.98 made generally available in...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...