Davey Winder
Visit/technology/34730/10-amazing-darpa-inventions
Technology

10 amazing DARPA inventions

Ten brilliant innovations that were born at - or inspired by - the legendary US defence agency
31 Oct 2019
Visit/cloud-security/34663/cloud-storage-how-secure-are-dropbox-onedrive-google-drive-and-icloud
cloud security

Cloud storage: How secure are the big players?

How the big cloud vendors stack up when it comes to encrypting and protecting your data
18 Oct 2019
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
list of poor passwords on notepad
Security

The top ten password-cracking techniques used by hackers

Think your passwords are secure? Think again
14 Oct 2019
Visit/penetration-testing/33981/what-is-penetration-testing
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
Advertisement
Visit/security/34177/unfortunately-compromising-business-email-accounts-is-much-easier-than-you-might
Security

Compromising email accounts is easier than you might imagine

Why you should take steps to protect your business from zombie phishing attacks
11 Aug 2019
Visit/security/28086/iot-privacy-and-security-concernsissues
Security

IoT privacy and security concerns/issues

We take a look at what's needed to really secure the IoT...
30 Apr 2019
Visit/security/32045/the-a-z-of-security-threats-2018
Security

The A-Z of security threats 2018

Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
Visit/cyber-attacks/31436/what-is-a-cyber-kill-chain
Graphic of a cyber criminal or hacker
cyber attacks

What is a cyber kill chain?

How understanding the progression of an online attack can help you defend your business
13 Jul 2018
Visit/social-engineering/30017/social-engineering-the-biggest-security-risk-to-your-business
social engineering

Social engineering: your business' biggest security risk

It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Advertisement
Visit/virtualisation/30908/move-over-vms-the-future-of-app-deployment-is-in-containers
virtualisation

Move over VMs, the future of app deployment is in containers

A look at a more flexible and efficient way to isolate and modularise your apps
10 Apr 2018
Visit/network-security/30466/secure-your-wi-fi-against-hackers-in-10-steps
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
Advertisement
Visit/network-security/30466/secure-your-wi-fi-against-hackers-in-10-steps/page/0/1
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
Visit/networking/29850/how-to-build-web-traffic-without-turning-to-the-dark-side/page/0/1
Network & Internet

How to build web traffic without turning to the dark side

You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
Visit/networking/29850/how-to-build-web-traffic-without-turning-to-the-dark-side
Network & Internet

How to build web traffic without turning to the dark side

You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
Visit/security/28117/how-to-protect-against-cyber-threats-2
Security

How to protect against cyber threats

IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
Advertisement
Visit/public-sector/28729/brace-yourself-for-brexit
Brexit
public sector

Brace yourself for Brexit

Leaving the EU is supposed to give British businesses a boost, but it might not be as simple as that
30 May 2017
Visit/security/28651/why-smbs-need-a-good-disaster-recovery-plan-in-place
Security

Why SMBs need a good disaster recovery plan in place

Work in a small business? Then you’re a target for ransomware
14 May 2017
Visit/security/28178/were-still-waiting-for-uk-government-to-get-strategic-about-cybersecurity
Security

Why UK government must get strategic about cybersecurity

Government investment in cybersecurity is great, but what matters is where the money goes
22 Feb 2017
Visit/security/27266/how-to-carry-out-workplace-email-surveillance
Email surveillance
Security

How to carry out workplace email surveillance

Want to monitor employee communications? Davey Winder explains your rights and obligations
19 Sep 2016
Visit/security/27069/five-security-threats-windows-10-protects-you-against
Security

Five security threats Windows 10 protects you against

Love it or hate it, Windows 10 is a pretty secure OS
9 Aug 2016
Visit/hacking/26820/four-cheap-dark-web-threats-and-how-to-protect-your-firm
hacking

Four cheap dark web cyber threats

Hackers are turning to the dark web for cheap exploits - here's how to protect your business
29 Jun 2016
Advertisement
Visit/security/26720/five-weirdest-password-alternatives-of-all-time
Security

Five weirdest password alternatives of all time

Computers can identify you based on your butt and your walk, not to mention your smell...
14 Jun 2016
Visit/security/26594/privacy-is-the-collateral-damage-in-our-war-on-terror
Security

Privacy is the collateral damage in our war on terror

More UK citizens must value privacy for government to leave our data alone
23 May 2016
Advertisement
Visit/hacking/26466/ethical-hackers-are-finally-getting-their-rewards
Hacking on keyboard
hacking

Ethical hackers are finally getting their rewards

For too long, the unsung heroes of cybersecurity have been undervalued
3 May 2016
Visit/hacking/26331/panama-papers-why-a-nation-state-super-hacker-isnt-responsible
hacking

Why a nation state isn't behind the Panama Papers hack

Mossack Fonseca had its data stolen via an embarrassingly easy security flaw
11 Apr 2016
Visit/security/26266/encryption-is-a-touchy-subject-for-the-home-office
Encryption
Security

Encryption is a touchy subject for the Home Office

Theresa May's Modern Crime Prevention Strategy: strong on rhetoric, light on security measures
24 Mar 2016
Visit/government-it-strategy/26226/budget-2016-what-about-cybersecurity-spending
George Osborne
Opinion

Budget 2016: What about cybersecurity spending?

George Osborne's failure to explain how cyber budget will be spent was a missed opportunity
16 Mar 2016
Visit/malware/26203/admit-it-apple-fans-macs-are-no-more-secure-than-the-rest-of-them
Apple MacBook Retina 12in review
malware

Why Macs are no more secure than the rest of them

Mac users are fiercely defending their platform's security after KeRanger, but they're wrong to
11 Mar 2016
Visit/security/26164/rsa-2016-ex-nsa-officer-admits-other-countries-could-open-encryption-backdoors
NSA data
Security

RSA 2016: FBI and NSA line up next to security vendors

The Apple-FBI encryption battle rightly dominates discussion at security conference
3 Mar 2016
Visit/public-sector/26119/would-a-brexit-weaken-data-privacy-in-the-uk
public sector

Would a Brexit weaken data privacy in the UK?

Data privacy should be a central issue in debate of EU referendum pros and cons
26 Feb 2016
Visit/security/26065/the-fbi-wants-a-legal-backdoor-from-apple-not-a-technical-one
Security

FBI wants a legal backdoor from Apple, not a technical one

Is the FBI's court ruling about more than getting into San Bernardino killer's iPhone?
17 Feb 2016
Visit/security/26013/why-safer-internet-day-could-teach-businesses-a-thing-or-two
Security

Safer Internet Day could teach businesses a thing or two

Safer Internet Day 2016 promotes better web security for families - but corporations should listen up as well
9 Feb 2016
Visit/data-protection/26005/privacy-shield-hammers-another-nail-in-the-coffin-of-data-protection
data protection

Why Privacy Shield will fail to protect our data

Safe Harbour’s replacement is based entirely on trust - what a big mistake
8 Feb 2016
Visit/data-protection/25952/lets-use-data-protection-day-to-highlight-just-how-bad-the-snoopers-charter-is
Internet privacy
data protection

Data Privacy Day should highlight sins of Snooper's Charter

The Investigatory Powers Bill remains the UK's biggest threat to privacy, says Davey Winder
28 Jan 2016
Visit/security/25912/smartwatch-security-threats-the-sky-isn-t-really-falling
Apple Watch release date, price & features
Security

Smartwatch security threats: The sky isn’t really falling

Wearables are too young to pose a real threat to data security, says Davey Winder
22 Jan 2016