Our Latest Blog Posts

VPN Leak Check – How to Check If Your VPN Works

Unfortunately, VPNs aren't immune to IP leaks. Read our guide on how to detect and prevent IP leakage, and keep yourself protected at all times....

Read Post >>
Harsh Maurya
Jun 21, 2017

How to REALLY Hide Your IP Address with a VPN

If you use the internet, you have an IP address. Just like your home address, your IP address displays your location (check it using this tool)  and allows...

Read Post >>
Sarit Newman
Jun 15, 2017

Science of Cybersecurity by Alan Radley- Free Chapter Included

How can we characterise Cybersecurity? How do data breaches, hacks, system exploits and computer intrusions happen - and why? What occurs when Cybersecurit...

Read Post >>
Ditsa Keren
Jun 15, 2017

Meet Sitelock – a Website Security Firm by Neill Feather

Neill Feather is the president of SiteLock, a leading provider of website security solutions for business. At SiteLock, Neill leads the company's approach ...

Read Post >>
Ditsa Keren
Jun 14, 2017

The 20 Biggest Hacking Attacks of All Time

Hacking, whether with dire implications or for "lulz", has a colorful history. Join us as we explore the top 20 of cyberattacks that changed the Internet....

Read Post >>
Ariel Hochstadt
Jun 08, 2017

Apperian – Managing and Securing Corporate Mobile Apps

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile d...

Read Post >>
Jackie Goldstein
Jun 07, 2017

10 ExtraTorrent Alternatives That Are Still Going Strong

With ExtraTorrent shutting down for good, the torrent scene has taken a major hit. You aren't out of options, however — find the next best trackers here!...

Read Post >>
Ditsa Keren
Jun 05, 2017

Moving Towards Policy Based Access Control is the Future of IAM

As more and more businesses are moving to the cloud, managing access permissions has become a daunting, yet crucial task for maintaining information securi...

Read Post >>
Ditsa Keren
Jun 04, 2017

Coronet – Allowing You to Safely Use Any Wi-Fi or Cellular Network

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, th...

Read Post >>
Jackie Goldstein
May 30, 2017

Trustlook Releases a Vaccine to the Wannacry Attack

2 weeks after its outbreak, the Wannacry attack is still taking victims, blackmailing some of the largest data centers in the world, including banks, gover...

Read Post >>
Ditsa Keren
May 29, 2017

What’s a VPN? Do You Need One? The 2018 VPN Guide for Newbies

VPNs are so easy to set up and use, anyone can do it - no technical background required. Learn how you can use a VPN to access blocked content, enhance you...

Read Post >>
Guy Fawkes
May 28, 2017

Webroot – Cloud-Based Protection For Home Users and Businesses

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy...

Read Post >>
Jackie Goldstein
May 26, 2017

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common...

Read Post >>
Jackie Goldstein
May 26, 2017

LIFARS – Proactive and Reactive Cybersecurity Solution

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding ...

Read Post >>
Jackie Goldstein
May 25, 2017

Live Updates: Online Censorship News

This is an on-going log of events concerning censorship around the globe. We update this page with the latest news regarding online censorship....

Read Post >>
Catherine Ablett
May 25, 2017

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for user...

Read Post >>
Jackie Goldstein
May 24, 2017

Auth0 – Making it Easy to Implement Identity Features

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers...

Read Post >>
Jackie Goldstein
May 23, 2017

Sqrrl – Hunting Threats Before They Do Real Damage

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? Ac...

Read Post >>
Jackie Goldstein
May 22, 2017

CompTIA Security+ Guide to Network Security Fundamentals- Free Chapter Included!

Dr. Mark Ciampa is an Associate Professor of Information Systems in the Gordon Ford College of Business at Western Kentucky University.  Prior to this he w...

Read Post >>
Ditsa Keren
May 18, 2017

SCADAfence – Securing The Systems That Power Our Life

SCADAfence is a pioneer in securing Industrial IoT/Industrie 4.0 networks from cyber threats, covering the smart manufacturing and smart building sectors, ...

Read Post >>
Ditsa Keren
May 18, 2017
...1020...2829303132...40...