Application Security

Featured

Top 10 Apps for Cybersecurity

Cyber security apps have become indispensable tools for proactively managing and mitigating risks

Featured

Top 10 Apps for Cybersecurity

Cyber security apps have become indispensable tools for proactively managing and mitigating risks

Could passkeys be the start of a passwordless future?

Canonical unveils Ubuntu 23.10 to enhance device encryption

Glovo: Tech unicorn delivery app now dining at top table

Securing Sensitive Business Data with Arctic Wolf & iManage

QR ‘Quishing’ scams: Do you know the risks?

Could passkeys be the start of a passwordless future?

Canonical unveils Ubuntu 23.10 to enhance device encryption

Articles

View all
Featured

Misused monitoring tools turn phones into spies for spouses

Time to check your smartphone for a curious new icon that could not only be secretly spying on you, but also leaking sensitive personal data across the web

Beyond Identity passkey adoption tool offers better security

Beyond Identity has launched The Passkey Journey to offer accelerated passkey deployment and work to protect valuable digital data from cyber crime

VMware cybersecurity solution to assist security teams

Launching the Carbon Black XDR strategy, VMware aims to offer users enhanced visibility and cyber production for cloud-native applications

Cyberattack in Kenya impacts online government platforms

Top 10 Identity Access Management Tools

Top 10 MDR Companies

RKVST launches Instaproof instant verification of any file

Teens and tweens targeted by game hack attacks, says McAfee

Wib joins SecureIT to accelerate API security across Nordics

Beyond Identity passkey adoption tool offers better security

Beyond Identity has launched The Passkey Journey to offer accelerated passkey deployment and work to protect valuable digital data from cyber crime

Misused monitoring tools turn phones into spies for spouses

Time to check your smartphone for a curious new icon that could not only be secretly spying on you, but also leaking sensitive personal data across the web

Cyberattack in Kenya impacts online government platforms

Anonymous Sudan claim responsibility for an extensive cyberattack in Kenya which saw multiple government services impacted and raised digital concerns

Top 10 Identity Access Management Tools

With cybersecurity systems needed now more than ever, Cyber Magazine considers some of the top Identity Access Management (IAM) tools to protect businesses

Top 10 cyber unicorns

Cyber Magazine considers some of the leading cybersecurity companies by revenue, who work to ensure that individuals and businesses are digitally protected

Top 10 risk and compliance consultants

Cyber Magazine considers some of the leading organisations in risk and compliance consultancy and how their solutions work to enact business transformation

Top 10 Antivirus Software Companies