347 Results for:spyware
- Sort by:
7 questions to ask before you select software testing tools
13 Apr 2020Before you select software testing tools, you need to know how to evaluate them. Explore trial versions, research the vendors and assess your organization's needs and capabilities. Read More
Telegram zero-day exploit is a warning
14 Feb 2018The discovery of an exploit of a zero-day vulnerability in the Telegram messaging app demonstrates that not all “secure” apps are automatically safe, security experts have warned Read More
Why nation-state cyberattacks must be top of mind for CISOs
01 May 2020Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Here's why. Read More
How can you deal with all the new macOS security controls?
08 Nov 2018How to deal with KEXT whitelisting and TCC controls, and how to stay up to date on the latest developments. Read More
Four Windows 10 built-in security features to know
12 Apr 2018IT needs an effective plan to maximize security for Windows 10 and get the most out of its built-in features. Read More
How do source code reviews of security products work?
29 Nov 2017Tensions between the U.S. and Russia have led to source code reviews on security products, but the process isn't new. Expert Michael Cobb explains what to know about these reviews. Read More
The various offers of Microsoft System Center Endpoint Protection
31 Jul 2017Expert Ed Tittel examines System Center Endpoint Protection, Microsoft's native Windows antivirus and antimalware security product. Read More
Contact tracing: The privacy vs protection debate
05 May 2020The Covid-19 pandemic has necessitated extreme measures not seen in peacetime for over 100 years. Contact-tracing apps are being developed as a tool for managing the pandemic, but are they a step too far? Read More
Fortnite will require Android users to allow unknown sources. Time to rethink MTD and EMM policies?
14 Aug 2018If consumers get in the habit of installing Android apps from unknown sources, some of our assumptions around Android BYOD, management, and security will have to change. Read More
10 endpoint security products to protect your business
23 Apr 2019Check out this product roundup and discover all the features endpoint security protection offers, such as patch management, email protection and reporting. Read More