IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper cover with title and green square graphic top rightwhitepaper
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

Cost savings and business benefits enabled by Mac
12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Dell PowerStore with white background
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

New PowerStore update aims to deliver up to a 50% mixed-workload performance boost and up to 66% greater capacity
4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
Michael Dell speaking on stage at Dell Technologies World 2022
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

The tech giant also added Cyber Recovery Services to its existing Apex portfolio and announced a multi-cloud collaboration with Snowflake Data Cloud
3 May 2022
How do you become an ethical hacker?
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
What is phishing?
Email sign with a fish hook on blue digital background
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
29 Apr 2022
Ransomware demands in Japan are almost 26 times higher than in the UK, report finds
Worried Businessman Looking At Computer With Ransomware Word On The Screen At The Workplace
ransomware

Ransomware demands in Japan are almost 26 times higher than in the UK, report finds

Ransom demands tend to be lower in order to make it easier for organisations to pay them, according to Sophos researchers
27 Apr 2022
BT and Toshiba address QKD concerns with new trial
Map of BT and Toshiba's QKD trial
encryption

BT and Toshiba address QKD concerns with new trial

The National Cyber Security Centre (NCSC) previously raised concerns of potential attacks
27 Apr 2022
The state of brand protection 2021
A log-in screen with a red background - whitepaper from Mimecastwhitepaper
Whitepaper

The state of brand protection 2021

A new front opens up in the war for brand safety
25 Apr 2022
The state of email security 2022
Whitepaper cover with image of a man walking along a beach, with a line graph overlaywhitepaper
Whitepaper

The state of email security 2022

Confronting the new wave of cyber attacks
25 Apr 2022
Best VPN services 2022
VPN software displayed on a laptop
Security

Best VPN services 2022

With remote working on the rise, we round up the best tried and tested VPN services
25 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code
A pink T-Mobile logo on a storefront in Aachen, Germany
data breaches

LAPSUS$ breached T-Mobile systems, stole source code

T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022
The Total Economic Impact™ of Mimecast
Total economic impact of Mimecast - whitepaper from Mimecastwhitepaper
Whitepaper

The Total Economic Impact™ of Mimecast

Cost savings and business benefits enabled by using Mimecast with Microsoft 365
25 Apr 2022
Security awareness training strategies for account takeover protection
Security awareness training strategies for account takeover protection - whitepaper from Mimecastwhitepaper
Whitepaper

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats
25 Apr 2022
Five Eyes nations warn against impending Russian cyber attacks
Russian hacking on a laptop mockup with code sprawling over the screen
cyber warfare

Five Eyes nations warn against impending Russian cyber attacks

Eight hacking groups have reportedly pledged allegiance to the Russian government, according to latest findings from the US, Australian, Canadian, New…
21 Apr 2022
Exclusive: Former Shiseido staff say company was aware of data breach weeks before official notice
Shiseido Company logo seen displayed on a smartphone
data breaches

Exclusive: Former Shiseido staff say company was aware of data breach weeks before official notice

Fake companies were created using the stolen identities of hundreds of Shiseido employees, former staff claim
20 Apr 2022
Shiseido reportedly suffers data breach
Shoppers walk past Japanese multinational personal care company Shiseido store seen in Hong Kong
data breaches

Shiseido reportedly suffers data breach

The Japanese cosmetics company has been accused of failing to notify affected staff of the leak
12 Apr 2022
Thoma Bravo acquires SailPoint for $6.9 billion
Sailpoint Technologies Holdings Inc. signage is displayed at a subway entrance near the New York Stock Exchange (NYSE) in New York, U.S., on Friday, Nov. 17, 2017
mergers and acquisitions

Thoma Bravo acquires SailPoint for $6.9 billion

Following the acquisition, SailPoint will no longer be listed on any public market
11 Apr 2022
Microsoft uses sinkhole to thwart Russian state-backed Fancy Bear attacks
Fancy Bear Hacker sitting in front of laptop
cyber attacks

Microsoft uses sinkhole to thwart Russian state-backed Fancy Bear attacks

Also known as APT28 or Strontium, Fancy Bear is one of the most active APT groups in the world
8 Apr 2022
No 10 urges gov and businesses to “act as one” against Russian cyber attacks
British Prime Minister Boris Johnson and Downing Street Chief of Staff Steve Barclay leave 10 Downing Street at Downing Street on February 22, 2022 in London
cyber attacks

No 10 urges gov and businesses to “act as one” against Russian cyber attacks

No 10 Chief of Staff, Steve Barclay warned of a “heightened risk of hostile cyber activity” coming from Russian hackers
6 Apr 2022
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
5 Apr 2022
Bring insights and data closer to customers with edge computing
Whitepaper cover with title, text and Red Hat logowhitepaper
Whitepaper

Bring insights and data closer to customers with edge computing

How to innovate, make faster decisions and provide engaging experiences
5 Apr 2022
Streamlining DevOps in hybrid, multi-cloud, on-premises, and edge environments
Whitepaper cover with title on grey block background and black graphic above with turquoise dotted waveswhitepaper
Whitepaper

Streamlining DevOps in hybrid, multi-cloud, on-premises, and edge environments

Simplifying the user experience and delivering As-a-Service benefits
5 Apr 2022