Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

SSL padlock icon
internet of things laptop

blocked shot volleyball

Survey says enterprises are stepping up their security game

To fight threats, enterprises are increasing information security spending, collaborating on threat intelligence efforts, and turning to cyber security insurance policies

Cloud Security

AWS security and compliance tools embrace enterprise clouds

Two new Amazon cloud products proactively deal with security issues before they become security and compliance problems

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is as good -- and far easier to compromise?

ipad security

Apple’s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID

Average business spends $15 million battling cyber crime

The cost was up 20 percent compared to last year, as attacks are happening more frequently and are becoming more severe

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor?

army artillery soldier war fight battle

Know your threats before you deploy defenses

Collecting information about how your organization was compromised in the past may not be fun, but without that step, you'll never do security right

Why aren't you managing your Macs?

Macs are showing up at work in larger numbers, but all too often, they're left unmanaged

Security online

Scottrade had no idea about data breach until the feds showed up

The breach affected around 4.6 million customers' names and addresses

Frustrated hipster sitting with laptop

Sorry, Unix fans: OS X El Capitan kills root

Root is no longer supreme in El Capitan, but the real bad news is a breaking change in legacy driver support


Breach at Experian may have exposed data on 15 million consumers linked to T-Mobile

Consumers who applied for credit from T-Mobile since 2013 may have been affected

emv chip and pin

EMV sets the stage for a better payment future

Most merchants now have EMV credit card readers in place, yielding marginally improved security today -- and a platform for better payment systems arriving soon

virtual encryption 175562932

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

cyber security lock secure security

When is a flaw not a flaw? The WinRAR question

A researcher found remote code execution flaw in WinRAR, but the real question is why are you opening unknown RAR files

login prompt security screen

Dyreza malware steals IT supply chain credentials

Cyber criminals are shifting gears from online banking to companies that provide order fulfillment, warehouse management, and other services


Developers find themselves in hackers' crosshairs

Here's what enterprises need to do in order to protect their development environments from attack

steal thief theft burglar laptop secret crime

Got 'em! Researchers steal crypto keys from Amazon cloud

Researchers demonstrate a cloud provider's nightmare: How to use a rogue VM to steal crypto keys from neighbors


Insiders still pose serious security risks

Don't underestimate the damage insiders can do -- and how little prodding they need to wreak havoc

Load More