Security

Security | News, how-tos, features, reviews, and videos

Cybersecurity
U.S. currency / banknotes / coins

p1240491 19

Microsoft security vulnerabilities drop after five-year rise

While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Not all patching problems are created equal

Virtually every month, patches released by Microsoft come with unexpected side effects that have to be mitigated. But not everyone will be affected — and those that are won’t always be hit the same way.

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

May's Patch Tuesday updates make urgent patching a must

With three zero-days and several serious vulnerabilities in key Windows server and authentication areas, it's time to patch now.

Apple messages scam

Europe puts Apple’s CSAM plans back in the spotlight

The European Commission intends to force messaging services to begin monitoring for such material, just as Apple now does.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Just what does Windows 11 bring to the table?

For many enterprise users (with the right Windows licensing) Windows 11 offers a number of security upgrades. But for more regular users, those tools may not be available.

Binary flag of the European Union showing a ripple effect.

Google responds to EU data rulings with new Workspace controls

Google is boosting its data protection controls for European Workspace users.

uem vendors 2022 cw promo

Download: UEM vendor comparison chart 2022

Unified endpoint management (UEM) platforms now dominate the enterprise mobility space. Our chart lets you quickly compare features and functions from eight top vendors.

uem vendors 2022 cw primary

Enterprise mobility 2022: UEM adds user experience, AI, automation

As unified endpoint management platforms mature, vendors are expanding feature sets, embracing ‘modern management,’ and blurring the line between endpoint management and security.

Russian sanctions ukraine war

Russia is losing the cyberwar against Ukraine, too

Not only has Russia seen setbacks on the battlefield in Ukraine, it's not faring well in the less-obvious cyberwar either. One reason: Russia's ally Belarus was still using Windows XP to keep the trains running on time.

siri ios13 listening

Think the video call mute button keeps you safe? Think again

Have you recently been on a video call, muted and then said something nasty about a client — or maybe even the boss? Were you confident the mute button was protecting your secret? You shouldn't have been.

macbook pro 2016 with display

Jamf adds network and endpoint security tools for enterprise Macs

Jamf has unveiled a series of significant updates designed to improve Mac enterprise security, and touted additional security solutions.

When it comes to data, resist your inner packrat

Hanging onto information after it's no longer needed carries all kinds of risks. Businesses need rules for when and how to throw stuff away.

12 zero trust

In a remote-work world, a zero-trust revolution is necessary

Zero trust is not just for cybersecurity specialists — it’s the new necessary way of life for business.

Android Security Settings

12 Android settings that'll strengthen your security

Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover and put into action.

Can your employer spy on your iPhone or Android phone?

California eyes law to protect workers from digital surveillance

Digital monitoring and AI supervision are increasingly prevalent in a wide range of job roles. With that in mind, the California State Assembly is working on a bill that could lead to a wide range of protections for employees in the...

esignature software eversign badge

Top 6 e-signature software tools

Electronic signature apps help businesses digitize processes that require signatures, such as contracts and legal documents. Integrating these tools into other business processes is the next step for enterprises. Here are the key...

An exclamation-mark alert in a field of abstract technology.

When humans make tech mistakes

Just because a vendor has a good track record doesn't mean they can't make mistakes that could lead to data loss. After all, tech vendors are human, too.

A hand reaches to activate controls marked with gear icons [ process / update / fix / automate ]

April's Patch Tuesday: a lot of large, diverse and urgent updates

This month's Patch Tuesday release was a big one, and includes fixes for Microsoft browsers and two zero-day vulnerabilities for Windows. Time to get busy updating!

Load More