network security

Microsoft doubles down on zero trust security policies
The Microsoft logo and a padlock placed on a black keyboard
enterprise security

Microsoft doubles down on zero trust security policies

New features across Azure, Microsoft 365 and Defender aim to protect customers against external breaches and insider threats
2 Mar 2021
National Grid plots £450 million overhaul of Britain’s fibre network
fibre optics
Network & Internet

National Grid plots £450 million overhaul of Britain’s fibre network

The programme will see a network operations centre to handle maintenance, address faults and bolster security
2 Mar 2021
SolarWinds blames intern for weak ‘solarwinds123’ password
A list of poorly-constructed passwords on a notepad
cyber attacks

SolarWinds blames intern for weak ‘solarwinds123’ password

The password ‘solarwinds123’ was publicly accessible on GitHub for more than a year and brought to the firm's attention in 2019
1 Mar 2021
HTTP vs HTTPS: What difference does it make to security?
HTTPS browser
Network & Internet

HTTP vs HTTPS: What difference does it make to security?

We look at the difference between the two and tell you how to switch between them
19 Feb 2021
What is network forensics?
A magnifying glass searching code for fingerprints
cyber attacks

What is network forensics?

Taking a closer look at how cyber threats are investigated at a network level
17 Feb 2021
Managing employee security risks during lockdown
A man working on a laptop
Security

Managing employee security risks during lockdown

COVID-19 doesn’t have to compromise your organisation’s security
8 Feb 2021
How to choose networking software for your business
A server overlaid with a concept image of networking, featureing nodes for different types of technology, such as Wi-fi and upload/download connected by lines
network security

How to choose networking software for your business

A healthy network is a productive network – and, therefore, a profitable one. Here's what to look for in a network monitoring system
5 Feb 2021
Beleaguered SolarWinds hit with fresh vulnerabilities
SolarWinds logo on the side of a building
vulnerability

Beleaguered SolarWinds hit with fresh vulnerabilities

Three severe flaws across Orion and Serv-U FTP can be exploited to launch remote code execution attacks and steal data
3 Feb 2021
Security analytics for your multi-cloud deployments
Security analytics for your multi-cloud deployments - whitepaper from IBMwhitepaper
Whitepaper

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief
2 Feb 2021
Apple drops controversial firewall-bypass feature on macOS
A mouse hovering over the Safari logo on a MacBook
firewalls

Apple drops controversial firewall-bypass feature on macOS

Researchers claim the ContentFilterExlusionList posed a huge cyber security risk
15 Jan 2021
Channel Pro Insight: A fast guide to central network management
A fast guide to central network management - whitepaperwhitepaper
Whitepaper

Channel Pro Insight: A fast guide to central network management

How to stay connected and secure with central network management
13 Jan 2021
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
12 Jan 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach
Security lock cyber protection
Security

AWS CISO urges companies to adopt a zero-trust security approach

Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Russian hackers are exploiting critical VMware flaws
Abstract silhouette of a computer hacker in front of a Russian flag
Security

Russian hackers are exploiting critical VMware flaws

The vulnerabilities were patched last week, but the NSA has uncovered details of active exploitation
8 Dec 2020
2FA bypass flaw on cPanel threatens the security of 70 million domains
A man using 2FA on his smartphone to access a service on his laptop
Security

2FA bypass flaw on cPanel threatens the security of 70 million domains

Hackers were able to try as many 2FA codes as they wanted using brute force methods before landing on the right one
25 Nov 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
Security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Visual representation of an active botnet, with several black nodes connected with white strands
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

Businesses warned to prioritise security as coronavirus forces many to ply their trade digitally
22 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
An anonymous mobile phone user using their device in a darkened room
Security

Mobile browser flaw exposes users to spoofing attacks

Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
Weekly threat roundup: Nvidia, BitLocker, and HackerOne
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Nvidia, BitLocker, and HackerOne

The most dangerous and pressing flaws from the week gone by
2 Oct 2020
BT and Toshiba reveal UK’s first "unhackable" quantum-secure network
Network & Internet

BT and Toshiba reveal UK’s first "unhackable" quantum-secure network

The network aims to show how the Quantum Key Distribution can be used to secure data traffic between industrial sites
1 Oct 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020