Heathrow turns to Thales for anti-drone tech
Airport buys in drone-spotting system from Aveillant, a Cambridge startup bought by Thales in 2017
44 million Microsoft customers found using compromised passwords
The company has issued widespread password resets for those affected
Millions of text messages leaked through exposed TrueDialog server
Database of 604GB included unencrypted passwords and the contents of SMS messages
What is DevSecOps and why is it important?
This new flavour of DevOps is helping organisations rapidly implement security by design
Thousands of businesses vulnerable to 'severe' Oracle EBS flaws
The suite of enterprise products can be exploited for financial fraud and theft
Embracing automation will produce better analysts
There’s no reason why we shouldn’t be automating menial security processes in 2019, according to McAfee
The state of email security
The latest threats, confidence killers and bad behaviours - and a cyber resilience strategy to fix them
Who should take ownership of your cyber security strategy?
We explore the options of who should be in charge of this increasingly important area
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
Patch management vs vulnerability management
What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
Modern cyber security bears 'great resemblance to Titanic'
The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
What is island hopping?
Far from being part of an exotic holiday, island hopping is a hacking technique that could pose a serious threat to your business
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
What are Meltdown and Spectre and are you affected?
A guide to the CPU security flaws and their flawed patches
Carbon Black execs reveal post-acquisition plans
Security firm's CEO and CTO talk integration, growth and Gelsinger
Microsoft patches abundance of Windows vulnerabilities
BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
UK gov launches second audit of cyber security labour market
Public and private sector firms will be probed on what security skills they currently lack
$125 Equifax compensation application now open
A further $500 is up for grabs under special circumstances
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
SonicWall TZ300P review: A multi-site marvel
A competitively priced desktop UTM appliance, with plenty of security and management features
What does the cloud mean to enterprise security?
Preparing government and education for mobile, social and cloud security
Kaspersky Endpoint Security for Business Advanced review
Excellent device protection for modern businesses