network security

What is SSID?
wireless router
broadband

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet
28 May 2021
Businesses must "embrace chaos" to improve cyber resilience
The CEO of RSA, Rohit Ghai speaking at RSA 2021 Conference
cyber security

Businesses must "embrace chaos" to improve cyber resilience

RSA's CEO on what Netflix's internal network disruptor and the WannaCry hack can teach the security industry
18 May 2021
Sophos XG 230 Rev.2 review: Powerful and flexible
Sophos XG 230 Rev.2
unified threat management (UTM)

Sophos XG 230 Rev.2 review: Powerful and flexible

This high-performance UTM appliance boasts extensive cloud management and remote-security services
1 Apr 2021
Remote workforce security report
remote workforce security report - whitepaper from Oktawhitepaper
Whitepaper

Remote workforce security report

Key challenges, security threats, and investment priorities of organisations during the pandemic
10 Mar 2021
Microsoft doubles down on zero trust security policies
The Microsoft logo and a padlock placed on a black keyboard
enterprise security

Microsoft doubles down on zero trust security policies

New features across Azure, Microsoft 365 and Defender aim to protect customers against external breaches and insider threats
2 Mar 2021
National Grid plots £450 million overhaul of Britain’s fibre network
fibre optics
Network & Internet

National Grid plots £450 million overhaul of Britain’s fibre network

The programme will see a network operations centre to handle maintenance, address faults and bolster security
2 Mar 2021
SolarWinds blames intern for weak ‘solarwinds123’ password
A list of poorly-constructed passwords on a notepad
cyber attacks

SolarWinds blames intern for weak ‘solarwinds123’ password

The password ‘solarwinds123’ was publicly accessible on GitHub for more than a year and brought to the firm's attention in 2019
1 Mar 2021
HTTP vs HTTPS: What difference does it make to security?
HTTPS browser
Network & Internet

HTTP vs HTTPS: What difference does it make to security?

We look at the difference between the two and tell you how to switch between them
19 Feb 2021
What is network forensics?
A magnifying glass searching code for fingerprints
cyber attacks

What is network forensics?

Taking a closer look at how cyber threats are investigated at a network level
17 Feb 2021
Managing employee security risks during lockdown
A man working on a laptop
Security

Managing employee security risks during lockdown

COVID-19 doesn’t have to compromise your organisation’s security
8 Feb 2021
How to choose networking software for your business
A server overlaid with a concept image of networking, featureing nodes for different types of technology, such as Wi-fi and upload/download connected by lines
network security

How to choose networking software for your business

A healthy network is a productive network – and, therefore, a profitable one. Here's what to look for in a network monitoring system
5 Feb 2021
Beleaguered SolarWinds hit with fresh vulnerabilities
SolarWinds logo on the side of a building
vulnerability

Beleaguered SolarWinds hit with fresh vulnerabilities

Three severe flaws across Orion and Serv-U FTP can be exploited to launch remote code execution attacks and steal data
3 Feb 2021
Security analytics for your multi-cloud deployments
Security analytics for your multi-cloud deployments - whitepaper from IBMwhitepaper
Whitepaper

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief
2 Feb 2021
Apple drops controversial firewall-bypass feature on macOS
A mouse hovering over the Safari logo on a MacBook
firewalls

Apple drops controversial firewall-bypass feature on macOS

Researchers claim the ContentFilterExlusionList posed a huge cyber security risk
15 Jan 2021
Channel Pro Insight: A fast guide to central network management
A fast guide to central network management - whitepaperwhitepaper
Whitepaper

Channel Pro Insight: A fast guide to central network management

How to stay connected and secure with central network management
13 Jan 2021
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
12 Jan 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach
Security lock cyber protection
Security

AWS CISO urges companies to adopt a zero-trust security approach

Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Russian hackers are exploiting critical VMware flaws
Abstract silhouette of a computer hacker in front of a Russian flag
Security

Russian hackers are exploiting critical VMware flaws

The vulnerabilities were patched last week, but the NSA has uncovered details of active exploitation
8 Dec 2020
2FA bypass flaw on cPanel threatens the security of 70 million domains
A man using 2FA on his smartphone to access a service on his laptop
Security

2FA bypass flaw on cPanel threatens the security of 70 million domains

Hackers were able to try as many 2FA codes as they wanted using brute force methods before landing on the right one
25 Nov 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
Security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Visual representation of an active botnet, with several black nodes connected with white strands
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

Businesses warned to prioritise security as coronavirus forces many to ply their trade digitally
22 Oct 2020