Nieuws

The need for a second generation certified Operating System Protection Profile (OSPP) becomes apparent when you take a look at the current reality of networked systems and the few general purpose ...
According to the revised Interstate Treaty on the Protection of Minors in the Media, operating systems must soon ensure they include a "youth protection device".
ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operating system (OS) by embracing Zero Trust Architecture (ZTA ...
Organizations must look beyond operating system protections to develop holistic strategies addressing their entire digital footprint.
Phone protection systems are stepping into the future, with quantum encryption, behavioural analysis, machine-learning. Could predictive policing be next?
This is why AACS goes even further, requiring that operating systems constantly monitor the "integrity" of the content protection system and purposely stop playing content in the event that any ...
Earlier this year, Linux Web servers were getting hacked more often than systems running Microsoft Windows, but now Windows once again tops the list of most targeted online operating systems ...
If we compare the security of the new Microsoft Vista operating system to how a car works, is it worth the time and possible frustration of the upgrade?
Some software you may know and lean on won't work in El Capitan due to a new security feature that locks down system files and directories. Here's how to modify that.
Apple introduced System Integrity Protection (rootless) mode as a security feature in OS X El Capitan. It prevents you (and programs) from changing root-level files even with your password, but it ...