The top cybersecurity products, chosen by our expert staff based on our in-depth analysis of the market for security tools.

  • Review: SUPERAntiSpyware 5

    SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates in regards to both the free and premium editions of SUPERAntiSpyware 5. We’ll see if it’s worth your time and money to use the free… Read more

  • Intro to Next Generation Firewalls

    The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s an “all-or-nothing” approach. Newer firewall technology can also filter traffic based upon the applications or traffic types traversing these ports. For example, you could open… Read more

  • Linux Hardening – Quick Wins

    The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker — a custom compiled kernel and the bare minimum of packages needed for the server to do its intended job.   But what if you… Read more

  • More Tips on Removing Viruses and Malware

      The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloading more malware and/or paying for fake antivirus protection.These programs are often called scareware or Trojan horses. If you receive any antivirus alerts,… Read more

  • Ten Tips to Make Your SSL Secure

    If your SSL server have misconfigurations and known vulnerabilities that make it insecure, follow these ten tips to avoid common SSL security mistakes.   1. Disable support for SSL v2 – This version of the SSL protocol was shown to be insecure over 15 years ago, but many web servers still support it. Disabling it… Read more

  • Top 5 PDF Risks and How to Avoid Them

    In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. By mid-year, PDF exploits had fallen to 30 percent, overtaken by Java. However, PDF remains the world’s second most popular target. For those running PDF software – lead by… Read more

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis