Microsoft announced a new service called Windows Defender Advanced Threat Protection, which it calls the next step in its efforts to protect enterprise customers. The service helps enterprises detect, investigate, and respond to advanced attacks on their networks, building on existing security features in Windows 10. There’s a new post-breach […]
Google announced some changes to Gmail to keep users safe. For one, if you receive a message from or are about to send a message to a person whose email service doesn’t support TLS encryption, Gmail will display a broken lock icon in the message.
Google says the number of paying organizations actively using Google Drive crossed a million earlier this year. The company is taking steps to improve security and privacy protection for Drive as well as Google Apps for Work and Google Apps for Education.
GoDaddy announced the integrations of GoDaddy Email Marketing, Shippo, and McAfee Secure Certification with GoDaddy Online Store to help users grow their small businesses without having to “deal with disparate technologies.”
The writing has been on the wall for quite a while. Flash is dying a slow death, yet it continues to gasp for air. After some new vulnerabilities were discovered, many have been calling for the plug to be pulled.
Dropbox is celebrating its 8th birthday by sharing a bunch of stats, including the fact that it has surpassed 400 million registered users. According to the company, users are taking Dropbox to work at over 8 million businesses. They also have 100,000 actual Dropbox for Business customers.
Biscom shared some results of a new IT Survey finding that although regulated industries say security is a high concern, many are still using solutions that are inadequate for protecting their data.
Automatic versus manual. A heavily debated subject whatever you speak of, and it is no different in the web application security industry. Should you do a manual penetration test or automatically scan all your websites with an automated web application security scanner? With which process you would find most vulnerabilities […]