Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

10 threat landscape apocalypse ruins
4 ways to protect your icloud password enable two factor authentication 2

mobile security data protection [Thinkstock]

Mobile device security for the road warrior

Follow these easy, inexpensive tips for keeping your smartphones and computers safe while traveling.

cloud security ts

Amazon Macie automates cloud data protection with machine learning

Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?

Microsoft Windows 10 logo bandage data map

8 steps to install Windows 10 patches like a pro

Tired of the bugs in Microsoft’s pushed patches? Here’s how to take control in Windows 10.

4tb drive

31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive - Deal Alert

Safely store massive amounts of photos, videos and music with this 4TB external drive from WD. Currently priced just $10 higher than its 3TB counterpart with this deal.

Movie preview test pattern

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories.

keys to access solutions admission movie ticket

What is OAuth? What security pros need to know

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

chromebook chrome logo

How to configure your Chromebook for ultimate security

Chrome OS is already tops at security, but with a few extra tweaks you can ensure the gates are even more secure.

antivirus

The best enterprise anti-virus protection may not be enough

Ransomware and other threats often get through signature-based anti-virus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy.

non management career paths

Cyber security jobs: Job descriptions and resources for today’s hottest roles

These resources and job descriptions will help cyber security professionals identify the best roles for them and allow employers to better communicate their expectations.

Cloud Security

AWS unveils AI monitoring for Amazon S3

Amazon Macie discovers and classifies sensitive data in S3 and automatically alerts to unusual activity and exposures

internet security privacy

How to protect personally identifiable information under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here's what you need to know.

img 20170426 133354 01

How to recover from a ransomware attack

Computer infected by ransomware? Don't panic. Follow the step-by-step instructions in this video for your best shot of removing it and recovering your data.

insurance cyber attack protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

Mingis_on_Tech
video

Mingis on Tech: Android vs iOS – Which is more secure?

Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.

security software programmer primary

New in Windows security: Automatically log off suspicious users

The Cloud App Security subscription service will boot users off the network, and out of apps and services, at the first sign of anomalous behavior.

Artificial intelligence and digital identity

The ABCs of Identity Management

Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.

Stealing I.P.

Intellectual property protection: The basics

Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets. This primer covers everything from establishing basic policies and procedures for...

tunnelbearxray 1

VPNs have a trust issue: Here's what TunnelBear did about it

TunnelBear's third-party security audit helped the VPN service fix vulnerabilities and prove its seriousness about protecting its customers.

Load More