AI-driven AMLOCK to streamline money laundering detection
AMLOCK uses AI to determine if a money laundering flag warrants a full investigation
The IT Pro Podcast: Breaking out of the security bubble
Just Eat CISO says Infosec professionals need to stop preaching to the choir
Who should take ownership of your cyber security strategy?
We explore the options of who should be in charge of this increasingly important area
WatchGuard Firebox T35-Rugged review: Industrial-strength security
This affordable appliance delivers a wealth of security services to places where competitors fear to tread
Intel to patch CacheOut flaw
Another ZombieLoad-style flaw hits Intel's processors, but an update is on the way
Heathrow turns to Thales for anti-drone tech
Airport buys in drone-spotting system from Aveillant, a Cambridge startup bought by Thales in 2017
44 million Microsoft customers found using compromised passwords
The company has issued widespread password resets for those affected
Millions of text messages leaked through exposed TrueDialog server
Database of 604GB included unencrypted passwords and the contents of SMS messages
What is DevSecOps and why is it important?
This new flavour of DevOps is helping organisations rapidly implement security by design
Thousands of businesses vulnerable to 'severe' Oracle EBS flaws
The suite of enterprise products can be exploited for financial fraud and theft
Embracing automation will produce better analysts
There’s no reason why we shouldn’t be automating menial security processes in 2019, according to McAfee
The state of email security
The latest threats, confidence killers and bad behaviours - and a cyber resilience strategy to fix them
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
Patch management vs vulnerability management
What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
Modern cyber security bears 'great resemblance to Titanic'
The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
What is island hopping?
Far from being part of an exotic holiday, island hopping is a hacking technique that could pose a serious threat to your business
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
What are Meltdown and Spectre and are you affected?
A guide to the CPU security flaws and their flawed patches
Carbon Black execs reveal post-acquisition plans
Security firm's CEO and CTO talk integration, growth and Gelsinger
Microsoft patches abundance of Windows vulnerabilities
BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
UK gov launches second audit of cyber security labour market
Public and private sector firms will be probed on what security skills they currently lack
$125 Equifax compensation application now open
A further $500 is up for grabs under special circumstances
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable