Disclosure:
Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

JC Cannon is considered as one of the foremost privacy authorities in the US. His background includes over 30 years of developing policies and standards, auditing digital products and services, planning and implementing website strategies and developing software. Most of all, he is known for his disciplined yet assertive approach to privacy- and he wrote 2 excellent books to tell you all about it. In this article Cannon gives vpnMentor readers a sneak preview to his latest publication, called Privacy in Technology - Standards and Practices for Engineers, Security and IT Professionals.
Dr. Mark A Gregory is an award winning professor teaching the next generation of Australian engineers. Having released more than 100 publications, his book Security and the Networked Society provides a refreshing view of the intricate complexity of cybersecurity today. And he has kindly agreed to share the first chapter with vpnMentor readers.
Launched in 2007 as an independent penetration testing firm, High-Tech Bridge has become a global provider of web and mobile application security testing services (AST). We've spoken to CEO and Founder Ilia Kolochenko to get a glimpse of his work. Here's what we found.
Not every email you receive deserves your attention, especially not ones trying to scam you. Using proprietary algorithms and deep background checks, Retruster scans your incoming email, alerting you to phishing, malware and ransomware attacks, and puts the power back in your hands, as CEO Michael Snape explains.
Preempt is a US-Israel collaboration founded by Ajit Sancheti and Roman Blachman. A couple of years ago they realized that one of the biggest challenges for enterprises is not attacks from the outside, but the lack of awareness and disloyalty at times, from people within the organization. It was based on this assumption that they founded Preempt, which helps corporations secure their data from within using a Behavioral Firewall, while helping to educate employees with security alerts embedded in the system. In this article, CEO Ajit Sancheti reveals the story behind insider threats and explains what businesses can do to protect themselves even from their own people.
Pattrick de Schutter is a typical serial entrepreneur. He founded Allmansland, one of the first web agencies in Belgium back in 1994; A couple of years later he launched IP Netvertising, the first ad-sales house in Belgium, which was later sold to RTL; In addition, he also took part in a number of successful ventures,...
Brett and Deborah Christensen have been a Hoax-Slayers since 2003, researching and writing about online scams and frauds and raising awareness to email, Internet and computer security issues that most common users know nothing about. In this article we give you a sneak preview to their book Protecting Yourself from Identity Theft, Internet Scams & Phone Scams.
Daniel Reis has spent over twenty five years working with major technology companies and customers to define and manage existing and new security products. Dan holds a Bachelor’s degree in economics, an MBA, and a Master’s in Information Systems Security. He spent many years working in network security protection systems and is now Director of Product Marketing with a global leader in threat intelligence. In this article we bring you the first chapter of his book Cybersecurity: Issues of Today, a Path for Tomorrow, where he explores topics organizations and security professionals wrestle with to deploy and maintain a robust secure environment.
Peter Kim describes himself as heavily involved in the security community. He's spent the last ten years working as a penetration tester and incident responder for a variety of business sectors. On his free time, he manages a local hackerspace in Santa Monica, and writes about his research at the SecurePla.net blog. His latest book, The Hacker Playbook 2: Practical Guide To Penetration Testing is a compilation of different methodologies that he's learned over the years, many of which he has presented at multiple security conferences over the years. In this article, Peter Kim gives vpnMentor readers a sneak preview to his book, which is available on Amazon in either Kindle or paperback edition.
Mostafa Hashem Sherif  is the author of Protocols for Secure Electronic Commerce, where he presents a compendium of protocols for securing e-commerce platforms B2B and B2C applications. In this article, vpnMentor brings you the first chapter of this fascinating book, along with a few remarks from the author.