Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Jay Leek, Blackstone CISO, on security automation

Jay Leek, chief information security officer at Blackstone, says the private equity giant has automated much of its security operations as well as initial investigations. The move has enabled his human security analysts to be more productive and focus on more high-value work.

2 days ago in Security

BlackBerry's DTEK50 fails to raise the security bar

BlackBerry's DTEK50

BlackBerry's newest phone is a passable for its price, but its misguided effort to promote its security as something bar-raising will not stand the test of time.

August 15, 2016 by in Security

Acronis vmProtect 6

Acronis vmProtect 6

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

January 23, 2012 by in Security

SonicWALL TZ 210

SonicWALL TZ 210

SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.

October 15, 2009 by in Security

PC Tools Desktop Maestro 3.0

PC Tools Desktop Maestro 3.0

As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.

August 21, 2008 by in Security

Most Popular