cyber security

Citrix patches XenMobile vulnerability
cyber security

Citrix patches XenMobile vulnerability

Positive Technologies spots serious flaw in Citrix XenMobile
11 Aug 2020
Key considerations for implementing secure telework at scale
Whitepaperwhitepaper

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce
10 Aug 2020
Why vulnerability management is crucial right now
vulnerability

Why vulnerability management is crucial right now

Proactive, watertight security is essential in the age of remote working and digital transformation
7 Aug 2020
Intel source code and internal documents hacked
data breaches

Intel source code and internal documents hacked

More than 20GB worth of sensitive data has been published online following a breach earlier in the year
7 Aug 2020
Advertisement
96% of UK businesses experienced at least one major cyber attack over past year
cyber security

96% of UK businesses experienced at least one major cyber attack over past year

Almost two thirds of these attacks affected vital operational technology
6 Aug 2020
Canon hit by suspected Maze ransomware attack
ransomware

Canon hit by suspected Maze ransomware attack

Two dozen domains and a host of internal services have been knocked offline
6 Aug 2020
Twitter hacker's virtual trial 'zoom bombed' after ID leak
video conferencing

Twitter hacker's virtual trial 'zoom bombed' after ID leak

The Judge was forced to cut the Zoom meeting short after a pornogprahic clip was shared to its participants
6 Aug 2020
Rethink your cybersecurity strategy for the new world
Whitepaperwhitepaper

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future
5 Aug 2020
Advertisement
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
5 Aug 2020
Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

Venafi claims machine identity capabilities have been commoditized and added to off-the-shelf malware
4 Aug 2020
Advertisement
How do we fix security's toxic culture?
An illustration of three workers arguing under dark clouds
Careers & training

How do we fix security's toxic culture?

From high staff churn to bullying and loss of productivity, security teams are suffering when they fail to address poor working environments
4 Aug 2020
Sophos Central Endpoint Protection review: Because you’re worth it
endpoint security

Sophos Central Endpoint Protection review: Because you’re worth it

It’s a tad pricey, but Sophos offers versatile user-based protection and the best mobile security around
3 Aug 2020
Why remote working isn’t a cyber security risk
cyber security

Why remote working isn’t a cyber security risk

Much has been made of the dangers of working from home, but are they overhyped?
30 Jul 2020
Quantum security: The end of security as we know it?
Purple abstract quantum computing concept image
cyber security

Quantum security: The end of security as we know it?

It’s a core component of the developing DARQ technologies, but if a quantum computer performs as expected it could wreak havoc on cyber security
29 Jul 2020
Advertisement
ComplyAdvantage raises $50M in Series C funding round
cyber security

ComplyAdvantage raises $50M in Series C funding round

Latest funding round brings the to-date investment to $88 million
28 Jul 2020
Print Devices: An overlooked network security risk
Internet of Things (IoT)whitepaper

Print Devices: An overlooked network security risk

Printers are a target; give them the protection they need
27 Jul 2020
Remote worker cybersecurity best practices
cyber securitywhitepaper

Remote worker cybersecurity best practices

Strategies and tips to follow, helping to secure your workforce
27 Jul 2020
Cyber resilience centres will help protect SMBs from cyber crime
cyber crime

Cyber resilience centres will help protect SMBs from cyber crime

The National Crime Programme will also launch the Police CyberAlarm to monitor business threats
27 Jul 2020
IT Pro Panel: Return to sender
phishing

IT Pro Panel: Return to sender

Why is it so difficult to get email security right?
27 Jul 2020
Kaspersky Endpoint Security Cloud review: Merciless against malware
endpoint security

Kaspersky Endpoint Security Cloud review: Merciless against malware

Easily managed and good value, Kaspersky is a great choice for small businesses
27 Jul 2020
Advertisement
The IT Pro Podcast: The psychology of security
cyber security

The IT Pro Podcast: The psychology of security

How hackers exploit our brains as well as our binary
24 Jul 2020
University of York data breach was kept quiet for two months
data breaches

University of York data breach was kept quiet for two months

Software provider Blackbaud said it paid a ransom on the assurance the criminals will delete the stolen data
22 Jul 2020
F-Secure Protection Service for Business review: F-ing good security
endpoint security

F-Secure Protection Service for Business review: F-ing good security

Delivers great endpoint protection for a wide range of devices for a very reasonable price
20 Jul 2020