endpoint security
Okta agrees to buy rival Auth0 for $6.5 billion

Okta agrees to buy rival Auth0 for $6.5 billion
The merger will see Okta’s cloud-based identity services and Auth0’s backend user management services combine
4 Mar 2021
Hackers turn to 'silent stealing' in bid to exploit home workers

Hackers turn to 'silent stealing' in bid to exploit home workers
Cyber criminals are abandoning large-scale heists in favour of scams that earn them significantly smaller amounts of money
22 Feb 2021
Mastering endpoint security implementation

Mastering endpoint security implementation
More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
12 Feb 2021
What is WannaCry? 

What is WannaCry?
The full story behind one of the worst ransomware outbreaks in history
4 Feb 2021
Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism

Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism
This protective layer sandboxes incoming iMessages to protect users from malicious texts
29 Jan 2021
McAfee’s MVISION XDR takes security beyond the endpoint

McAfee’s MVISION XDR takes security beyond the endpoint
Cloud-native MVISION XDR tool detects threats and predicts countermeasures before a system is compromised
28 Jan 2021
Patch management vs vulnerability management

Patch management vs vulnerability management
What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
27 Jan 2021
BIOS security: The next frontier for endpoint protection
BIOS security: The next frontier for endpoint protection
Today’s threats upend traditional security measures
12 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach

AWS CISO urges companies to adopt a zero-trust security approach
Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Bitdefender debuts cloud-based endpoint detection and response solution 

Bitdefender debuts cloud-based endpoint detection and response solution
New solution enables quick visibility into vulnerabilities, both on-premises and in the cloud
2 Dec 2020
Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
Each of these popular cloud platforms boasts robust security - but which does it best?
20 Nov 2020
Microsoft expands Defender capabilities for Linux systems

Microsoft expands Defender capabilities for Linux systems
Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
Each of these popular cloud platforms boasts robust security - but which does it best?
17 Nov 2020
Lookout reveals mobile-first endpoint detection and response solution

Lookout reveals mobile-first endpoint detection and response solution
New EDR solution looks beyond the typical malware for threats on mobile devices
21 Oct 2020
Mobile browser flaw exposes users to spoofing attacks

Mobile browser flaw exposes users to spoofing attacks
Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
The importance of endpoint security

The importance of endpoint security
Working from home has been surprisingly effective during the pandemic, but it has also highlighted how essential strong endpoint security is for remot…
16 Oct 2020
Why endpoint security should be your first line of defence

Why endpoint security should be your first line of defence
With the way we work changing, endpoint security is more vital than ever
14 Oct 2020
BlackBerry Persona Desktop delivers zero-trust security at the endpoint

BlackBerry Persona Desktop delivers zero-trust security at the endpoint
New security solution learns user behavior and can take action if there’s an abnormality
6 Oct 2020
Apple's T2 security chip has an "unpatchable" vulnerability

Apple's T2 security chip has an "unpatchable" vulnerability
Exploiting the checkm8 and blackbird flaws can grant attackers control over a macOS-powered device
6 Oct 2020
Google removes 17 apps infected with evasive ‘Joker’ malware

Google removes 17 apps infected with evasive ‘Joker’ malware
Researchers identify three variations in the way the 'fleeceware' strain infects victims' Android devices
28 Sep 2020
Sophos Central Endpoint Protection review: Because you’re worth it

Sophos Central Endpoint Protection review: Because you’re worth it
It’s a tad pricey, but Sophos offers versatile user-based protection and the best mobile security around
3 Aug 2020
Avast Business Antivirus Pro Plus review: A balanced security suite

Avast Business Antivirus Pro Plus review: A balanced security suite
The web management portal may be basic, but the Avast agent provides a great set of protection measures
13 Jul 2020
IBM patches "highly dangerous" Maximo Asset Management flaw

IBM patches "highly dangerous" Maximo Asset Management flaw
Companies in aerospace, nuclear power and pharmaceutics are vulnerable to server-side request forgery attacks
18 Jun 2020