Featured Blog Post

5 Best VPN Chrome Extensions in 2018 (that actuall...

Extensions can make your browser that much better. But when it’s private, secure surfing we’re talking about, there are plenty of shady addons and plugins ...

5 Free Alternatives to OperaVPN Now That It Shut D...

OperaVPN just announced that the Android and iOS apps are shutting down on April 30th. While the free browser with the built-in VPN is still working, mo...

Sucuri – Website Security For Any Platform

Website security for small businesses can be just as important as it is for the big players.  However, misinformation regarding what steps can be taken to ...

Ensighten – Assuring EU Consumers’ Privacy in Comp...

With the deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) quickly approaching, businesses engaging with consumers...

Zertificon – Securing Your Email Both Within and B...

“The entire world is my target market” – that is essentially what Dr. Burkhard Wiegel, CEO of Zertificon is saying about his email encryption products. You...

MailGuard – Proactive Cloud-Based Web and Email Se...

Just like a well-thought-out business plan, building and maintaining an effective cyber security policy and apparatus is a key component of any business to...

BeyondTrust – Making Sure Users Don’t Abuse Their ...

BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given t...

Lumeta – Providing Complete Visibility and Real-ti...

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some ...

cFocus Software – Automating the Process of Secure...

Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having do...

35 Best VPN Deals for Black Friday/Cyber Monday 20...

Black Friday and Cyber Monday might be over, but that doesn't mean you can't get some great deals. Our list of VPN deals and coupons will get you a great d...

The Best (and Worst) Ad Blockers UPDATED

Pop up advertisements are some of the most annoying things you'll find on the Internet, especially when they appear suddenly after you click on a website o...

Donald Trump Used a VPN in China, Here’s Why...

It seems China’s Firewall is no match for U.S. President Donald Trump. While visiting China on an 11-day trip across Asia, Trump managed to tweet a than...

pretty Easy privacy – Effective Email Privacy That...

Leon Schumacher, the Co-Founder and CEO of pretty Easy privacy, is extremely focused on one – and only one – goal. He wants to make email privacy simple to...

Watch ESPN Live Even if You’re Outside of th...

ESPN is one of the most popular live sports television brands in America attracting millions of viewers. Their Monday Night Football alone draws over 10 mi...

Arxan – Protecting Your Applications at Every Leve...

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or ...

Masergy – Managed Security Services for Every Budg...

The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizati...

ThreatMetrix – A Global Identity Network of Users,...

When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are th...

CipherCloud – Protecting Your Data on the Way to C...

My interview with Pravin Kothari, the founder and CEO of CipherCloud, covers a wide range of topics related to security software. Of course, Pravin describ...

Trusona – On a Mission to Eliminate Passwords From...

As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for th...

Protenus – Protecting Patient Privacy in Electroni...

Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Pr...

VPN Use and Data Privacy Stats for 2018

We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our ...

Phantom – Automating Threat Response Across Device...

Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security thr...

GamaSec – Enterprise-Grade Security for the SMB M...

The security products offered by GamaSec are so good, they convinced a leading insurance company to offer an insurance policy against data breaches along w...

ERPScan – Securing SAP and Oracle Enterprise Busin...

In this interview with Alexander Polyakov, the founder and CTO of ERPScan, we discuss a relatively new, or at least relatively unknown, form of security vu...

Baffle – Protecting Your Databases From Breaches

As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his co...

Wombat Security Technologies – Security Training t...

While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious ...

VMRay – The Hypervisor-Based Sandbox That Cannot b...

Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many differen...

iboss – A Single Secure Web Gateway Platform in t...

In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in...

Nexus – Enabling Trusted Identities

As Magnus Malmström, vice president of products at Nexus Group tells us, Nexus is an established European security company that underwent a significant “ma...

Lastline – Keeping Everyone Safe in a Bigger Sandb...

What started as a university research project has evolved into a leading commercial product for Chris Kruegel, the co-founder and Chief Executive Officer o...

IDVector – Making Privacy and Security Simple

Ben Baumgartner, the co-founder of IDVector, has spent his extensive professional career working in the information security space. For much of that time, ...

BankVault.com – You Can’t Hack Something Tha...

The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that ...

ENVEIL – Never Decrypt Your Data

It should not come as any surprise that the mantra repeated by Dr. Ellison Anne Williams, the CEO and founder of ENVEIL is “Encrypt Your Data.” As you will...

Accellion – Securing and Sharing Your Documents Wh...

More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In ge...

Panopticon Labs – Making Online Gaming Safe and Fu...

Did you know that the revenues of the online computer gaming industry are larger than that of the Hollywood and music industries combined? With that much m...

GigaTrust – Keeping Your Emails and Documents Safe...

The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and...

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, whic...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, bloc...

Confusing Cyber Criminals with Illusive Networks

We formed illusive networks three years ago, determined to solve the issue of targeted attacks. We knew that there were extremely sophisticated attacks hur...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile d...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, th...

VPN 101 – vpnMentor’s VPN Guide for Ne...

If you're alive, surfing the web in the year 2017, and living anywhere that isn't under a rock, , you've undoubtedly heard and read the term "VPN" at least...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding ...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for user...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? Ac...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as e...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive co...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay attent...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutio...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and security solutions. They offer enterprises the choice of either hardware solutions...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society withi...

Internet Trends 2018. Stats & Facts in the U....

While we're dedicated to VPN's and online privacy issues, vpnMentor is also your resource for Internet trends and data. As a result, we've scoured the m...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the companies you're involved in. Lets not start in the middle ages, we'll start when I go...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41 authorizes federal magistrate judges to issue warrants for law enforcement sea...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar Ilan University has exposed breaches in the encryption mechanism of the search en...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a particular term and location. In fact, Google’s Ad Preview Tool has quite a few limitati...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means you are sacrificing your privacy in return. Surprisingly, it is not just the N...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This firmware works on Linux operating systems and is compatible with different rou...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the world. Governments are more concerned about the use of OpenVPNs and are doing whate...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular basis will know that we are avid fans of the Netflix for Pirates application also ...

Proxies vs VPNs vs Tor – Understanding the Differe...

There are many reasons to use online privacy and anonymity tools when browsing the web, downloading or streaming content. From, as they say, covering one’s...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption technologies are certified and developed by the National Institute of Standards and Technolo...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox starting using the HTTPS protocol for secure communication in 2014, which helps Dro...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people living in China and some parts of the internet – especially those parts that criti...

Our Latest Blog Posts

Firmitas’ Device-Side Security is Changing the Face of OT Systems

Firmitas cyber solutions is a technology company founded in 2014 by a team of industry veterans with extensive experience both in the technology and busine...

Read Post >>
Ditsa Keren
Jun 22, 2018

How to Watch UFC 226 Miocic v. Cormier Fight Night Online

UFC 226 Miocic vs. Cormier is Saturday, July 7th. We know you don't want to miss any of the action, so in just 3 easy steps we’re going to show you how to ...

Read Post >>
Sara Levavi-Eilat
Jun 18, 2018

There is No Free UFC, But You Can Get 50% Off

You love the action and energy of UFC Fight Night, so you’re looking for the easiest and cheapest way to watch it online. If you’ve done that search al...

Read Post >>
Sara Levavi-Eilat
Jun 18, 2018

10 Apps & Gadgets You Need to Digitally Pack for Vacation

You don't always think about packing apps and gadgets for your trip, but they can actually be super helpful. See which apps, gadgets, and gizmos you should...

Read Post >>
Shauli Zacks
Jun 14, 2018

Meet WebARX – The Web Application Firewall for Digital Agencies

WebARX is a cyber security firm focused on providing digital agencies with Website firewall, uptime monitoring and domain reputation checks for their entir...

Read Post >>
Ditsa Keren
Jun 14, 2018

Teramind – A Fully Customizable Approach to User Behavior Monitoring and Insider Threat Prevention

With employees having access to more sensitive information than ever, companies need the ability to detect and prevent threats from inside, be they through...

Read Post >>
Gail Lobel Rand
Jun 13, 2018

Best VPN Coupons for the 2018 FIFA World Cup

The 2018 FIFA World Cup is fast approaching and we have the best VPN coupons for you! Check out the best deals below....

Read Post >>
Shauli Zacks
Jun 07, 2018

Don’t Miss These 20 Leading Innovators at Cyber Week 2018

The biggest names in cybersecurity are getting together in Tel Aviv, Israel from June 17th - June 22nd at the Tel Aviv University. Cyber Week has grown ...

Read Post >>
Shauli Zacks
Jun 06, 2018

DataVisor is Using Multi-Dimensional Algorithms to Detect Fraudulent User Accounts

Professional attackers wanting to exploit legitimate social media users are mass registering abusive user accounts in ways that they appear legitimate. Try...

Read Post >>
Gail Lobel Rand
Jun 05, 2018

The 5 Best VPNs for Finland in 2018 – Fast, Simple, Reliable

Finland is not a country where you need to worry about censorship; you can easily access Google, Facebook, YouTube, and more. But there are some things ...

Read Post >>
Catherine Ablett
Jun 03, 2018

4 Popular Israel-based VPNs to Keep You Secure

There are a couple of reasons you might want to use a VPN provider based in Israel. For one, Israel is not part of the 5/14 Eye Alliance. This alliance...

Read Post >>
Sara Levavi-Eilat
May 30, 2018

Medigate is Changing the Game for Connected Medical Devices

Medigate is an israeli startup company focused on securing the safe operation of connected medical devices. These mission critical devices are changing the...

Read Post >>
Ditsa Keren
May 29, 2018

Calcom Makes Hardening Automation a Smooth Process for IT Professionals

Established in 2001, CalCom provides solutions for configuration hardening automation, helping IT teams to enforce and manage security baselines for large ...

Read Post >>
Ditsa Keren
May 28, 2018

Browser Spam Could be Stealing Your Customers, PageSeal CEO Explains

Imagine you're walking into a Best Buy store to buy a TV. A sales person shows you the different models, you come to a conclusion and you're even happy wit...

Read Post >>
Ditsa Keren
May 28, 2018

5 Internet Hazards to Know About While Traveling

Whether it’s for business or for pleasure, for many traveling is part of life. In the past, we packed essentials before a trip like a toothbrush, some clot...

Read Post >>
Guy Fawkes
May 24, 2018

Covata – Military-grade Cybersecurity

Getting the top-level security is a must for many organizations in an increasingly complicated cyberworld.  Using experience garnered from military-grade s...

Read Post >>
Eytan Morgenstern
May 23, 2018

How to Watch RTP Outside of Portugal

RTP – also known as Radio and Television for Portugal –  is Portugal’s main TV and Radio network. It includes four national television channels and three m...

Read Post >>
Guy Fawkes
May 23, 2018

ControlCase – Automating Compliance

With data security regulations becoming increasingly critical – especially with the upcoming General Data Protection Regulation (GDPR) – organizations and ...

Read Post >>
Eytan Morgenstern
May 23, 2018

uTorrent vs. BitTorrent – Which is Faster for Mobile/Desktop in 2018?

When it comes to torrent clients, uTorrent and BitTorrent are two veterans with huge, loyal followings. But what makes one better than the other? Is it ...

Read Post >>
Sara Levavi-Eilat
May 22, 2018

5 Best VPN Chrome Extensions in 2018 (that actually work!)

Extensions can make your browser that much better. But when it’s private, secure surfing we’re talking about, there are plenty of shady addons and plugins ...

Read Post >>
Nicky Hosek
May 20, 2018