enterprise security

Visit/security/enterprise-security/354531/heathrow-turns-to-thales-for-anti-drone-tech
enterprise security

Heathrow turns to Thales for anti-drone tech

Airport buys in drone-spotting system from Aveillant, a Cambridge startup bought by Thales in 2017
14 Jan 2020
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

The company has issued widespread password resets for those affected
6 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server
cyber security

Millions of text messages leaked through exposed TrueDialog server

Database of 604GB included unencrypted passwords and the contents of SMS messages
2 Dec 2019
Visit/security/enterprise-security/354215/what-is-devsecops-and-why-is-it-important
enterprise security

What is DevSecOps and why is it important?

This new flavour of DevOps is helping organisations rapidly implement security by design
27 Nov 2019
Advertisement
Visit/vulnerability/34849/thousands-of-businesses-vulnerable-to-severe-oracle-ebs-flaws
vulnerability

Thousands of businesses vulnerable to 'severe' Oracle EBS flaws

The suite of enterprise products can be exploited for financial fraud and theft
20 Nov 2019
Visit/security/34719/the-tech-industry-must-embrace-automation-if-it-wants-better-security-analysts
Cyber security automation mockup
Security

Embracing automation will produce better analysts

There’s no reason why we shouldn’t be automating menial security processes in 2019, according to McAfee
31 Oct 2019
Visit/security/cyber-security/354075/the-state-of-email-security
cyber securitywhitepaper

The state of email security

The latest threats, confidence killers and bad behaviours - and a cyber resilience strategy to fix them
30 Oct 2019
Visit/enterprise-security/34017/who-should-take-ownership-of-your-cyber-security-strategy
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
enterprise security

Who should take ownership of your cyber security strategy?

We explore the options of who should be in charge of this increasingly important area
30 Oct 2019
Visit/security/30099/five-steps-to-an-effective-layered-defence-strategy
Security

Five steps to an effective layered defence strategy

Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
Advertisement
Visit/security/27713/the-importance-and-benefits-of-effective-patch-management
Security

Patch management vs vulnerability management

What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
21 Sep 2019
Visit/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Advertisement
Visit/cyber-attacks/33200/what-is-island-hopping
City with network of coloured lines and dots connecting buildings
cyber attacks

What is island hopping?

Far from being part of an exotic holiday, island hopping is a hacking technique that could pose a serious threat to your business
17 Sep 2019
Visit/endpoint-security/30837/four-strategies-organisations-are-using-to-combat-cyber-attacks
Security shield with glowing technology circle around the outside and a red and green hue surrounding
endpoint security

Four ways organisations are combating cyber attacks

AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Visit/exploits/30478/what-are-meltdown-and-spectre-and-are-you-affected
exploits

What are Meltdown and Spectre and are you affected?

A guide to the CPU security flaws and their flawed patches
29 Aug 2019
Visit/acquisition/34287/carbon-black-execs-reveal-post-acquisition-plans
Acquisition

Carbon Black execs reveal post-acquisition plans

Security firm's CEO and CTO talk integration, growth and Gelsinger
28 Aug 2019
Advertisement
Visit/cyber-security/34205/microsoft-patches-abundance-of-critical-and-wormable-windows-vulnerabilities
Microsoft's flagship OS Windows 10 on a purple graphic
cyber security

Microsoft patches abundance of Windows vulnerabilities

BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
14 Aug 2019
Visit/enterprise-security/34133/uk-gov-launches-second-audit-of-cyber-security-labour-market
enterprise security

UK gov launches second audit of cyber security labour market

Public and private sector firms will be probed on what security skills they currently lack
2 Aug 2019
Visit/security/34064/125-equifax-compensation-application-now-open
Equifax on phone
Security

$125 Equifax compensation application now open

A further $500 is up for grabs under special circumstances
26 Jul 2019
Visit/security/33537/what-is-shadow-it
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
19 Jul 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/unified-threat-management-utm/33933/sonicwall-tz300p-review-a-multi-site-marvel
unified threat management (UTM)

SonicWall TZ300P review: A multi-site marvel

A competitively priced desktop UTM appliance, with plenty of security and management features
1 Jul 2019
Advertisement
Visit/security/enterprise-security/354367/what-does-the-cloud-mean-to-enterprise-security
enterprise securitywhitepaper

What does the cloud mean to enterprise security?

Preparing government and education for mobile, social and cloud security
28 Jun 2019
Visit/endpoint-security/33558/kaspersky-endpoint-security-for-business-advanced-review-on-prem-security
endpoint security

Kaspersky Endpoint Security for Business Advanced review

Excellent device protection for modern businesses
1 May 2019