endpoint security

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?

Each of these popular cloud platforms boasts robust security - but which does it best?
20 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
17 Nov 2020
Patch management vs vulnerability management
Plasters over a hard disc drive to symbolise patch management
Security

Patch management vs vulnerability management

What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
12 Nov 2020
Lookout reveals mobile-first endpoint detection and response solution
Lookout logo on white background
Security

Lookout reveals mobile-first endpoint detection and response solution

New EDR solution looks beyond the typical malware for threats on mobile devices
21 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
An anonymous mobile phone user using their device in a darkened room
Security

Mobile browser flaw exposes users to spoofing attacks

Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
The importance of endpoint security
Sponsored

The importance of endpoint security

Working from home has been surprisingly effective during the pandemic, but it has also highlighted how essential strong endpoint security is for remot…
16 Oct 2020
Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
15 Oct 2020
Why endpoint security should be your first line of defence
An abstract image of pins on a board connected by strings, representing a network
Sponsored

Why endpoint security should be your first line of defence

With the way we work changing, endpoint security is more vital than ever
14 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
BlackBerry Persona Desktop delivers zero-trust security at the endpoint
screen showing BlackBerry Persona interface
Security

BlackBerry Persona Desktop delivers zero-trust security at the endpoint

New security solution learns user behavior and can take action if there’s an abnormality
6 Oct 2020
Apple's T2 security chip has an "unpatchable" vulnerability
A partially-closed Macbook displaying a range of colours
Security

Apple's T2 security chip has an "unpatchable" vulnerability

Exploiting the checkm8 and blackbird flaws can grant attackers control over a macOS-powered device
6 Oct 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
The Google Play Store application as shown on a smartphone display
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

Researchers identify three variations in the way the 'fleeceware' strain infects victims' Android devices
28 Sep 2020
BIOS security: The next frontier for endpoint protection
Whitepaperwhitepaper

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures
18 Aug 2020
Sophos Central Endpoint Protection review: Because you’re worth it
endpoint security

Sophos Central Endpoint Protection review: Because you’re worth it

It’s a tad pricey, but Sophos offers versatile user-based protection and the best mobile security around
3 Aug 2020
Avast Business Antivirus Pro Plus review: A balanced security suite
endpoint security

Avast Business Antivirus Pro Plus review: A balanced security suite

The web management portal may be basic, but the Avast agent provides a great set of protection measures
13 Jul 2020
IBM patches "highly dangerous" Maximo Asset Management flaw
vulnerability

IBM patches "highly dangerous" Maximo Asset Management flaw

Companies in aerospace, nuclear power and pharmaceutics are vulnerable to server-side request forgery attacks
18 Jun 2020
Keep yourself protected with our list of the best security suites
cyber security

Keep yourself protected with our list of the best security suites

With more malware lurking in the shadows than ever before, it’s critical that you keep yourself safe
4 Jun 2020
WhatsApp flaw leaves users open to 'shoulder surfing' attacks
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

Hackers can gain full access to individual’s WhatsApp accounts using just their phone number
21 Apr 2020
Survey: Managing endpoint devices amid the coronavirus outbreak
endpoint security

Survey: Managing endpoint devices amid the coronavirus outbreak

Device management is a large enough task, and the coronavirus hasn’t made things easier
17 Apr 2020
Facebook tried to buy NSO Group's Pegasus spyware to monitor iOS users
privacy

Facebook tried to buy NSO Group's Pegasus spyware to monitor iOS users

Social network wanted to integrate surveillance tech into its Onavo Protect app
6 Apr 2020
Qualys offers 60 days of free remote endpoint protection
cyber security

Qualys offers 60 days of free remote endpoint protection

Get 60 days of free remote endpoint protection to keep your remote team safe
24 Mar 2020
Kaspersky grants healthcare bodies free security software
cyber security

Kaspersky grants healthcare bodies free security software

Six months of fully-licensed software includes cloud security and Microsoft Office 365 protection
23 Mar 2020