IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

enterprise security

Can we ever achieve cyber security buy-in?
A woman using her phone as a device for 2FA
cyber security

Can we ever achieve cyber security buy-in?

Members of the IT Pro Network share their experiences of trying to encourage good cyber hygiene in the workplace
23 Mar 2023
Kali Linux releases first-ever defensive distro with score of new tools
A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text 'KALI'
enterprise security

Kali Linux releases first-ever defensive distro with score of new tools

Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary
14 Mar 2023
Freshworks CISO Jason Loomis on the first 100 days as security chief
Close-up photo of Jason Loomis, CISO at Freshworks
chief information security officer (CISO)

Freshworks CISO Jason Loomis on the first 100 days as security chief

Fewer than 100 days in the role, Jason Loomis reveals his plans for the future of security at Freshworks, and discusses the rising threat of API vulne…
23 Jan 2023
The IT Pro Podcast: Going passwordless
The IT Pro Podcast logo with the episode title 'Going passwordless'
enterprise security

The IT Pro Podcast: Going passwordless

Something you are, or something you have, could be more important than a password you know in the near future
6 Jan 2023
Podcast transcript: Going passwordless
The IT Pro Podcast logo with the episode title 'Going passwordless'
enterprise security

Podcast transcript: Going passwordless

Read the full transcript for this episode of the IT Pro Podcast
6 Jan 2023
Lab-based cyber attacks are no serious threat – yet
A cyber security researcher at their desk
cyber security

Lab-based cyber attacks are no serious threat – yet

There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
19 Nov 2022
Revealed: The top 200 most common passwords of 2022
A greyscale hand emerging from a hole, removing a password string, against a blue background
cyber security

Revealed: The top 200 most common passwords of 2022

While the most common passwords worldwide are largely the same, gender and region did have an effect on frequency
17 Nov 2022
Six cyber security holes you need to plug now
Graphic with hexagonal tiles with a lockpad and one tile with an unlocked lock pad against a red background
cyber security

Six cyber security holes you need to plug now

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
8 Nov 2022
LockBit repeats 'PR stunt' as Thales ransomware investigation reveals no breach
A close up shot of a building with the words Thales displayed at the top
ransomware

LockBit repeats 'PR stunt' as Thales ransomware investigation reveals no breach

The ransomware group threatened to leak stolen data on the dark web, but Thales denies any attack occurred
3 Nov 2022
Cisco announces Duo Passwordless Authentication for Single Sign On (SSO) apps
The Cisco logo hanging against fairy lights
Security

Cisco announces Duo Passwordless Authentication for Single Sign On (SSO) apps

The addition is one of several new capabilities being introduced across the company’s security portfolio
2 Nov 2022
Cyber security engineer vs analyst: What's the difference?
Somebody with glasses thinking while looking at a screen in a dark room
Careers & training

Cyber security engineer vs analyst: What's the difference?

We examine the differences between these two roles and the varying prospects for both career paths
28 Oct 2022
NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests
Abstract image of a fishing hook through a red email to represent a phishing attack
phishing

NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests

The debate around the importance of phishing tests in cyber security rages on but businesses need to be careful if they decide to embrace them, the UK…
10 Oct 2022
Microsoft to end Client Access Rules support in Exchange Online by 2023
A laptop on a table with the Microsoft Exchange logo displayed
mail servers

Microsoft to end Client Access Rules support in Exchange Online by 2023

The deprecation process will begin as early as October 2022, according to reports
28 Sep 2022
WatchGuard Firebox T20-W review
A photograph of the WatchGuard Firebox T20-W
unified threat management (UTM)

WatchGuard Firebox T20-W review

This affordable desktop appliance is a great choice for protecting small offices and home workers
21 Sep 2022
Sophos XGS 116 review: A small and mighty appliance
A photograph of the Sophos XGS 116
unified threat management (UTM)

Sophos XGS 116 review: A small and mighty appliance

This clever and compact security gateway brings outstanding security and remote management features at a tempting price
14 Sep 2022
Gartner: Most businesses are dropping security vendors to improve cyber resiliency
A series of digital padlocks layered on top of each other
Security

Gartner: Most businesses are dropping security vendors to improve cyber resiliency

The vast majority of organisations around the world are pursuing vendor consolidation to improve security and decrease complexity
13 Sep 2022
Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts
The Windows (start menu) key on a keyboard
cyber security

Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts

The broken update pushed to users on Sunday morning saw the likes of Teams, Slack, Chrome, and Edge all being confused with the dangerous Hive ransomw…
5 Sep 2022
Podcast transcript: What did we learn from WannaCry?
Podcast transcript: What did we learn from WannaCry?
WannaCry

Podcast transcript: What did we learn from WannaCry?

Read the full transcript for this episode of the IT Pro Podcast
2 Sep 2022
The IT Pro Podcast: What did we learn from WannaCry?
The IT Pro Podcast: What did we learn from WannaCry?
WannaCry

The IT Pro Podcast: What did we learn from WannaCry?

Five years on, WannaCry still remains one of the most impactful security incidents in recent memory
2 Sep 2022
What is threat hunting?
Somebody using a red-backlit keyboard on their laptop
cyber security

What is threat hunting?

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
Will FIDO passwordless authentication save cyber security?
A digital padlock representing security
cyber security

Will FIDO passwordless authentication save cyber security?

Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
A graphic of a red CPU with a white skull and crossbones on it, placed upon a grey background
Hardware

Retbleed hardware-level flaw brings overhead woe to Intel and AMD

‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
13 Jul 2022