Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Smackdown: Enterprise monitoring vs TLS 1.3 and DoH

Smackdown: Enterprise monitoring vs TLS 1.3 and DoH

New encryption standards TLS 1.3 and DNS-over-HTTPS are sweeping the last crumbs of visible user activity off the enterprise network table. Fail to take any action, and within two years, you'll lose the ability to analyze network traffic and detect the cyberthreats that will endanger your organization.

August 11, 2020 by

10 Linux distros: From different to dangerous

10 Linux distros: From different to dangerous

One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're going to showcase some of those distros. Be careful, though. You may not want to load these, or if you do, put them in isolated VMs. We're not kidding when we say they could be dangerous.

August 19, 2019 by

2019's tech, security, and authentication trends

2019's tech, security, and authentication trends

We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, one million apps and services, and billions of authentications.

July 16, 2019 by

Acronis vmProtect 6

Acronis vmProtect 6

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

January 23, 2012 by