Security Software

Security | News, how-tos, features, reviews, and videos

Purple neon icon of web content filtering against a dark background
Workers working on computer that says Password and has a lock icon

Businessman walking on twisted rope high in sky

Removing security complexity to combat cyber threats

Businesses are struggling with an overwhelming, and increasingly complex and confusing cyber world. Ian McShane, Field CTO at Arctic Wolf looks at how cyber simplicity is the key for businesses to move forward with their security...

A businessman reaching out to touch a user type login, and password

Auth0 vs Azure Active Directory (Azure AD): Which Single Sign-On (SSO) solution is better?

Peerspot users evaluate two of the highest reviewed solutions in the Single Sign-On (SSO) market – Auth0 and Azure Active Directory (Azure AD).

Businessman on mobile phone logging in to secure account

Single Sign-On (SSO): Which solution is best?

Peerspot users review the highest reviewed solutions in the single sign-on market.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

IDGConnect_cyber_prevention_mitigation_security_shutterstock_2005877624_1200x800

Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?

IDGConnect_peerspot_security_automation_SOAR_shutterstock_1931787956_1200x700

Security orchestration, automation and response (SOAR): Which solution is best?

Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.

IDGConnect_cyberthreat_threat_cyber_security_shutterstock_285058184_1200x800

A look ahead to 2022: predicting the top cyber threats

Looking ahead to 2022, Raj Samani, McAfee Fellow and Chief Scientist at McAfee Enterprise examine the top 2022 cybersecurity threats, including an increase in various types of nation state attacks, as well as a shift in the...

IDGConnect_endpointprotection_ITcentral_shutterstock_694483051_1200x800

Endpoint Protection for Business (EPP): Which solution is best?

IT Central Station users review the highest reviewed solutions in the endpoint protection for business (EPP) market.

IDGConnect_unifiedthreatmanagement_ITcentral_shutterstock_1918593848_1200x800

Unified threat management (UTM): Which solution is best?

IT Central Station users review the highest reviewed solutions in the unified threat management (UTM) market.

IDGConnect_SIEM_itcentral_shutterstock_1949097475_1200x800

Security Information and Event Management (SIEM): Which solution is best?

IT Central Station users review the highest reviewed solutions in the security information and event management (SIEM) market.

IDGConnect_conversation_security_cybersecurity_shutterstock_1798108960_1200x800

Beginning a more mature conversation about cybersecurity

No system is invulnerable to breaches. So how can businesses withstand any storm and thrive regardless of a threatening landscape? Creating institutional cyber-resilience is ultimately more important than any other measure a company...

IDGConnect_applicationsecurity_security_shutterstock_184658570_1200x800

Sonatype Nexus Lifecycle and WhiteSource: Which application security solution is better?

IT Central Station users review two of the highest reviewed solutions in the application security market – Sonatype Nexus Lifecycle and WhiteSource.

IDGConnect_firewall_security_shutterstock_1815683369_1200x800

Fortinet FortiGate and pfSense: Which firewall solution is better?

IT Central Station users review two of the highest reviewed solutions in the firewall market – Fortinet FortiGate and pfSense.

IDGConnect_containersecurity_itcentralstation_shutterstock_1112007800_1200x800

Aqua Security and Prisma Cloud by Palo Alto Networks: Which container security tool is better?

IT Central Station users review two of the highest reviewed solutions in the container security market – Aqua Security and Prisma Cloud by Palo Alto Networks.

IDGConnect_iProov_ID_identity_software_2000x1333

iProov CEO seeks to rebuild online trust in ID

Andrew Bud of secure biometrics firm iProov wants to show that people are who they say they are.

IDGConnect_data_strategy_shutterstock_1709507281_1200x800

5 data shifts that are steering business strategy

Focus is on the year ahead as it is set to give rise to disruptive data strategies and privacy-centric organisational shifts as businesses race to gain a competitive advantage without compromising on trust. Truata CEO Felix Marx...

IDGConnect_highlights_2020_regional_1200x800

From Latin America’s investment success to Europe’s AI advances: A look at our 2020 regional highlights

A look at our best regional stories from 2020.

Load More