Security

What can businesses learn from the cyber security challenges of coronavirus
A concept illustration of three people securing hardware and data, with a large coronavirus particle in the background
Security

What can businesses learn from the cyber security challenges of coronavirus

Throughout the pandemic, organisations have responded to a range of cyber security risks. Here are some of their biggest lessons
15 Oct 2020
Zoom adds support for in-meeting apps and live events
A smiling young man using Zoom's new apps while on a video call
video conferencing

Zoom adds support for in-meeting apps and live events

Plans for end to end encryption also revealed, four months after pledge to improve security
15 Oct 2020
Windows 10 update sparks driver compatibility fears
Two options shown on the Windows 10 start menu, reading "Update and shut down", or "Update and restart"
Microsoft Windows

Windows 10 update sparks driver compatibility fears

Over-zealous verification checks designed to tighten security may block some older drivers
15 Oct 2020
Why endpoint security should be your first line of defence
An abstract image of pins on a board connected by strings, representing a network
Sponsored

Why endpoint security should be your first line of defence

With the way we work changing, endpoint security is more vital than ever
14 Oct 2020
What to look for in a secure cloud system
Cloud padlock resting on laptop with city skyline behind
cloud security

What to look for in a secure cloud system

Not all cloud products support the same level of security, so what should organisations be looking out for?
14 Oct 2020
How to protect against a DDoS attack
Security

How to protect against a DDoS attack

DDoS attacks are on the up - here's how to fight back
14 Oct 2020
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
14 Oct 2020
What is a Trojan?
Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
14 Oct 2020
IBM updates Cloud Pak with ‘industry-first’ security tools
IBM building
Security

IBM updates Cloud Pak with ‘industry-first’ security tools

Cloud Pak for Security is getting pre-built integrations for additional threat intelligence feeds
14 Oct 2020
What is two-factor authentication?
Security

What is two-factor authentication?

Passwords aren't secure; it's time to add multi-factor authentication
14 Oct 2020
Microsoft fixes 'critical' wormable RCE flaw in Windows 10
Security

Microsoft fixes 'critical' wormable RCE flaw in Windows 10

The latest Patch Tuesday release sees 87 bugs fixed including the CVSS 9.8-rated vulnerability
14 Oct 2020
ICO to probe Klarna over marketing email blunder
Finger about to press the icon for Klarna's mobile app
Information Commissioner

ICO to probe Klarna over marketing email blunder

The ICO has opened an inquiry into the fintech firm after receiving complaints about unwanted marketing emails
14 Oct 2020
What is ransomware?
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
14 Oct 2020
The truth about ransomware
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
14 Oct 2020
Best VPN services 2020
A generic VPN logo shown on a laptop display while a person types
Security

Best VPN services 2020

With remote working on the rise, we round up the best tried and tested VPN services
14 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
13 Oct 2020
What is an MSSP?
Security

What is an MSSP?

Why appointing an MSSP is becoming the norm for SMBs
13 Oct 2020
Four tips for implementing effective cyber security awareness training
Drawing of a cloud with a padlock in the middle on a green background
Security

Four tips for implementing effective cyber security awareness training

Employees can be your strongest line of defence, but only if you take the time to build the right culture
13 Oct 2020
Securing remote workers in the age of teleworking
cyber securitywhitepaper

Securing remote workers in the age of teleworking

Using foundational network infrastructure
13 Oct 2020
2020 Cyber Threat Intelligence (CTI) survey
cyber crimewhitepaper

2020 Cyber Threat Intelligence (CTI) survey

How to measure the effectiveness of your CTI programme
13 Oct 2020
Cyber security automation for dummies
cyber securitywhitepaper

Cyber security automation for dummies

Tips for automating security responses and optimising your security ecosystem
13 Oct 2020
What is phishing?
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
13 Oct 2020
What are biometrics?
Security

What are biometrics?

Your face, iris, DNA ad typing style can all be used as a password
13 Oct 2020
FOI requests reveal "thousands" of government data breaches
An opened padlock on a laptop keyboard
data breaches

FOI requests reveal "thousands" of government data breaches

Government departments reported scores of breaches and made numerous notifications to the ICO between 2019 and 2020
13 Oct 2020