Featured Blog Post

Lumeta – Providing Complete Visibility and Real-ti...

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some ...

cFocus Software – Automating the Process of Secure...

Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having do...

35 Best VPN Deals for Black Friday/Cyber Monday 20...

Black Friday and Cyber Monday might be over, but that doesn't mean you can't get some great deals. Our list of VPN deals and coupons will get you a great d...

The Best (and Worst) Ad Blockers UPDATED: Nov 2017

Pop up advertisements are some of the most annoying things you'll find on the Internet, especially when they appear suddenly after you click on a website o...

Donald Trump Used a VPN in China, Here’s Why...

It seems China’s Firewall is no match for U.S. President Donald Trump. While visiting China on an 11-day trip across Asia, Trump managed to tweet a than...

pretty Easy privacy – Effective Email Privacy That...

Leon Schumacher, the Co-Founder and CEO of pretty Easy privacy, is extremely focused on one – and only one – goal. He wants to make email privacy simple to...

The 6 Best VPN Chrome Extensions in 2017

You use a VPN anyway, so why not have one for Chrome? Google Chrome is the most popular browser, so chances are you use it. And pairing it with your VP...

How to Watch ESPN Outside of the US

ESPN is one of the most popular live sports television brands in America attracting millions of viewers. Their Monday Night Football alone draws over 10 mi...

Arxan – Protecting Your Applications at Every Leve...

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or ...

Masergy – Managed Security Services for Every Budg...

The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizati...

ThreatMetrix – A Global Identity Network of Users,...

When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are th...

CipherCloud – Protecting Your Data on the Way to C...

My interview with Pravin Kothari, the founder and CEO of CipherCloud, covers a wide range of topics related to security software. Of course, Pravin describ...

Trusona – On a Mission to Eliminate Passwords From...

As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for th...

Protenus – Protecting Patient Privacy in Electroni...

Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Pr...

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our ...

Phantom – Automating Threat Response Across Device...

Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security thr...

GamaSec – Enterprise-Grade Security for the SMB M...

The security products offered by GamaSec are so good, they convinced a leading insurance company to offer an insurance policy against data breaches along w...

ERPScan – Securing SAP and Oracle Enterprise Busin...

In this interview with Alexander Polyakov, the founder and CTO of ERPScan, we discuss a relatively new, or at least relatively unknown, form of security vu...

Baffle – Protecting Your Databases From Breaches

As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his co...

Wombat Security Technologies – Security Training t...

While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious ...

VMRay – The Hypervisor-Based Sandbox That Cannot b...

Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many differen...

iboss – A Single Secure Web Gateway Platform in t...

In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in...

Nexus – Enabling Trusted Identities

As Magnus Malmström, vice president of products at Nexus Group tells us, Nexus is an established European security company that underwent a significant “ma...

Lastline – Keeping Everyone Safe in a Bigger Sandb...

What started as a university research project has evolved into a leading commercial product for Chris Kruegel, the co-founder and Chief Executive Officer o...

IDVector – Making Privacy and Security Simple

Ben Baumgartner, the co-founder of IDVector, has spent his extensive professional career working in the information security space. For much of that time, ...

BankVault.com – You Can’t Hack Something Tha...

The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that ...

ENVEIL – Never Decrypt Your Data

It should not come as any surprise that the mantra repeated by Dr. Ellison Anne Williams, the CEO and founder of ENVEIL is “Encrypt Your Data.” As you will...

Accellion – Securing and Sharing Your Documents Wh...

More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In ge...

Panopticon Labs – Making Online Gaming Safe and Fu...

Did you know that the revenues of the online computer gaming industry are larger than that of the Hollywood and music industries combined? With that much m...

GigaTrust – Keeping Your Emails and Documents Safe...

The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and...

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, whic...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, bloc...

Confusing Cyber Criminals with Illusive Networks

We formed illusive networks three years ago, determined to solve the issue of targeted attacks. We knew that there were extremely sophisticated attacks hur...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile d...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, th...

VPN 101 – vpnMentor’s VPN Guide for Ne...

If you're alive, surfing the web in the year 2017, and living anywhere that isn't under a rock, , you've undoubtedly heard and read the term "VPN" at least...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding ...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for user...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? Ac...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as e...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive co...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay attent...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutio...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and security solutions. They offer enterprises the choice of either hardware solutions...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society withi...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the companies you're involved in. Lets not start in the middle ages, we'll start when I go...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41 authorizes federal magistrate judges to issue warrants for law enforcement sea...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar Ilan University has exposed breaches in the encryption mechanism of the search en...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a particular term and location. In fact, Google’s Ad Preview Tool has quite a few limitati...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means you are sacrificing your privacy in return. Surprisingly, it is not just the N...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This firmware works on Linux operating systems and is compatible with different rou...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the world. Governments are more concerned about the use of OpenVPNs and are doing whate...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular basis will know that we are avid fans of the Netflix for Pirates application also ...

Proxies vs VPNs vs Tor – Understanding the Differe...

There are many reasons to use online privacy and anonymity tools when browsing the web, downloading or streaming content. From, as they say, covering one’s...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption technologies are certified and developed by the National Institute of Standards and Technolo...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox starting using the HTTPS protocol for secure communication in 2014, which helps Dro...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people living in China and some parts of the internet – especially those parts that criti...

Our Latest Blog Posts

Pen-Testing Web and Mobile Apps with High-Tech Bridge

Launched in 2007 as an independent penetration testing firm, High-Tech Bridge has become a global provider of web and mobile application security testing s...

Read Post >>
Ditsa Keren
Dec 12, 2017

How to Access Netflix’s Secret Movie Codes

We love movies, we love the Internet, we love Netflix. But with so many good titles going around, it’s often difficult to make up our minds — especially if...

Read Post >>
Ariel Hochstadt
Dec 12, 2017

How to Watch Nova TV Outside Bulgaria

Television is a big part of the Bulgarian lifestyle, and Nova TV is a favorite with a variety of content for all types of viewers. Nova TV is one of the...

Read Post >>
Guy Fawkes
Dec 10, 2017

How to Watch Canale 5 Outside Italy

Canale 5 made history in 1980 when it became the first privately-owned TV network to provide national coverage across Italy. Today, it has gained a massive...

Read Post >>
Guy Fawkes
Dec 10, 2017

7 Easy Ways to Secure Your Facebook

Facebook is the pioneer of social media. Just take a look at anyone’s Facebook feed and you will see thousands of posts about people’s daily lives. Even if...

Read Post >>
Sarit Newman
Dec 10, 2017

Lumeta – Providing Complete Visibility and Real-time, Actionable Data

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some ...

Read Post >>
Eytan Morgenstern
Dec 07, 2017

The Complete Cybersecurity Guide for Small and Medium Businesses

Table of contents Determine your vulnerabilities Protect your computers and devices A. Update your software B. Protect against viruse...

Read Post >>
Sarit Newman
Dec 07, 2017

Watch the 75th Golden Globes Online, Live and Worldwide with a VPN

While many details have yet to be revealed, such as the host, the nominations, and more, one thing is certain — the 75th annual Golden Globes are going to ...

Read Post >>
Michael Dagan
Dec 06, 2017

Best VPN Awards for 2018

We took a look at the performances of over 200 VPNs and awarded those that we think are the best ones for 2018. Find out which VPN won the best overall cat...

Read Post >>
Catherine Ablett
Dec 03, 2017

cFocus Software – Automating the Process of Securely Migrating U.S. Government Agencies to the Cloud

Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having do...

Read Post >>
Gail Lobel Rand
Nov 30, 2017

Authenticating Remote User Identity With CASQUE SNR

A long time ago, Basil Philipsz has founded Distributed Management Systems (DMS), which started originally as a software house doing small jobbing contract...

Read Post >>
Ditsa Keren
Nov 30, 2017

Thinking Security by Steven M. Bellovin – Free Chapter Included

Thinking Security is a book about adapting to rapidly changing technology and thinking out-of-the-box to prevent (or fix) future attacks. We sat down with ...

Read Post >>
Sarit Newman
Nov 28, 2017

Online Censorship has an Escalating Pattern. Where is Your Country Positioned?

Censorship is not new  Censorship is not a new occurrence, neither is it an idea that is specific to the World Wide Web. Information that is counter to...

Read Post >>
Catherine Ablett
Nov 23, 2017

How to Watch US Netflix in Argentina

While Netflix is available in Argentina, the catalogue of shows and movies is much smaller than what is offered on Netflix USA. Popular US Netflix shows...

Read Post >>
Donna Moses
Nov 19, 2017

18 FREE Online Tools for Privacy

We often fail to realize the importance of keeping ourselves hidden on the Internet. In an era when so many activities, from communications to payments,...

Read Post >>
Guy Fawkes
Nov 19, 2017

The Best VPNs for Israel – Fast & Reliable

Israel is an iconic country, considered a holy place by the world's three major monotheistic religions. With sites like the Western Wall, Dome of the Ro...

Read Post >>
Guy Fawkes
Nov 19, 2017

Which Browser is the Most Secure? Your Popular Browser Might be at Risk

It’s a fact that not all browsers are created equal, and determining which browser is the most secure is not as simple as you might think. There are man...

Read Post >>
Catherine Ablett
Nov 17, 2017

35 Best VPN Deals for Black Friday/Cyber Monday 2017

We asked all of our VPN providers for their Black Friday and Cyber Monday deals. Check out the deals below for some amazing savings!...

Read Post >>
Sarit Newman
Nov 16, 2017

The Best VPNs for Georgia (No Matter Where You Are!)

Why do you need a VPN in Georgia? You want to watch Georgia TV If you want to access and stream Georgia TV stations like Rustavi 2, Imedi TV, Fi...

Read Post >>
Donna Moses
Nov 14, 2017

How to Survive Online Without Google

It’s common knowledge that Google keeps track of all our activities. And the more Google services we use, the easier it gets for them to map us. From...

Read Post >>
Ariel Hochstadt
Nov 14, 2017
12345...10...