endpoint security

Visit/security/endpoint-security/356418/avast-business-antivirus-pro-plus-review-a-balanced-security
endpoint security

Avast Business Antivirus Pro Plus review: A balanced security suite

The web management portal may be basic, but the Avast agent provides a great set of protection measures
13 Jul 2020
Visit/security/vulnerability/356126/ibm-patches-highly-dangerous-maximo-asset-management-flaw
vulnerability

IBM patches "highly dangerous" Maximo Asset Management flaw

Companies in aerospace, nuclear power and pharmaceutics are vulnerable to server-side request forgery attacks
18 Jun 2020
Visit/cloud-security/34663/cloud-storage-how-secure-are-dropbox-onedrive-google-drive-and-icloud
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
18 Jun 2020
Visit/security/cyber-security/355932/keep-yourself-protected-with-out-list-of-the-best-security-suites
cyber security

Keep yourself protected with our list of the best security suites

With more malware lurking in the shadows than ever before, it’s critical that you keep yourself safe
4 Jun 2020
Advertisement
Visit/wannacry/34352/what-is-wannacry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
2 Jun 2020
Visit/security/27713/the-importance-and-benefits-of-effective-patch-management
Security

Patch management vs vulnerability management

What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
29 May 2020
Visit/endpoint-security/34536/mastering-endpoint-security-implementation
Endpoint protection or endpoint security interlocking gears
endpoint security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
11 May 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

Hackers can gain full access to individual’s WhatsApp accounts using just their phone number
21 Apr 2020
Advertisement
Visit/security/endpoint-security/355361/survey-managing-endpoint-devices-amid-the-coronavirus-outbreak
endpoint security

Survey: Managing endpoint devices amid the coronavirus outbreak

Device management is a large enough task, and the coronavirus hasn’t made things easier
17 Apr 2020
Visit/security/privacy/355231/facebook-tried-to-buy-spyware-firm-its-now-suing-to-monitor-ios-users
privacy

Facebook tried to buy NSO Group's Pegasus spyware to monitor iOS users

Social network wanted to integrate surveillance tech into its Onavo Protect app
6 Apr 2020
Advertisement
Visit/security/cyber-security/355102/qualys-offers-60-days-of-free-remote-endpoint-protection
cyber security

Qualys offers 60 days of free remote endpoint protection

Get 60 days of free remote endpoint protection to keep your remote team safe
24 Mar 2020
Visit/security/cyber-security/355081/kaspersky-grants-healthcare-bodies-free-security-software
cyber security

Kaspersky grants healthcare bodies free security software

Six months of fully-licensed software includes cloud security and Microsoft Office 365 protection
23 Mar 2020
Visit/security/cyber-security/354918/4-quick-tips-to-create-an-unbreakable-password
cyber security

4 quick tips to create an unbreakable password

Sink password pirates with these password-creation tips.
5 Mar 2020
Visit/security/malware/354499/fcc-is-supplying-malware-loaded-phones-to-low-income-users
malware

FCC is supplying malware-loaded phones to low-income users

Budget handsets are pre-installed with malicious apps that leak data to Chinese hackers, report finds
10 Jan 2020
Advertisement
Visit/cyber-security/34809/trickbot-trojan-named-the-most-dangerous-threat-to-healthcare
cyber security

TrickBot trojan named the most dangerous threat to healthcare

A lack of funding and legacy technology has led to the growing severity of healthcare's security landscape
13 Nov 2019
Visit/security/34744/first-mass-bluekeep-exploitation-spotted-in-the-wild
Networks connected with each other across the world
Security

First mass BlueKeep exploitation spotted in the wild

Amateurish coin mining attack discovered six months after the critical Microsoft vulnerability was discovered
4 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Visit/security/endpoint-security/354130/close-the-gap-in-device-security
endpoint securitywhitepaper

Close the gap in device security

Unprotected endpoints are quickly becoming a favourite attack vector
25 Oct 2019
Visit/security/34673/microsoft-partners-with-device-and-chip-makers-on-secured-core-pcs
Graphic of a secure laptop
Security

Microsoft partners with firms to build ‘secured-core' PCs

Secured-core PCs aim to mitigate firmware cyber security threats
22 Oct 2019
Visit/security/endpoint-security/354132/why-uem-is-the-key-to-enterprise-it-security
endpoint securitywhitepaper

Why UEM is the key to enterprise IT security

A guide to effective endpoint security
20 Oct 2019
Advertisement
Visit/security/34660/hackers-are-no-longer-winning-says-kpmg-cyber-chief
Hacker in the shadows
Security

Hackers 'are no longer winning', says KPMG cyber chief

Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
18 Oct 2019
Visit/software/34583/avast-business-patch-management-review-don-t-give-up-the-day-job-just-yet
Software

Avast Business Patch Management review

Good Windows patch management services but a work in progress
8 Oct 2019
Visit/security/34577/this-tool-can-work-out-how-often-your-company-will-be-hit-by-insider-attacks
Calculator for working out data breach risk
Security

This tool can figure out often you will face insider attacks

Size, sector and employee welfare all used as factors of email-based intrusion
7 Oct 2019