enterprise security
Can we ever achieve cyber security buy-in?

Can we ever achieve cyber security buy-in?
Members of the IT Pro Network share their experiences of trying to encourage good cyber hygiene in the workplace
23 Mar 2023
Kali Linux releases first-ever defensive distro with score of new tools

Kali Linux releases first-ever defensive distro with score of new tools
Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary
14 Mar 2023
Freshworks CISO Jason Loomis on the first 100 days as security chief

Freshworks CISO Jason Loomis on the first 100 days as security chief
Fewer than 100 days in the role, Jason Loomis reveals his plans for the future of security at Freshworks, and discusses the rising threat of API vulne…
23 Jan 2023
The IT Pro Podcast: Going passwordless

The IT Pro Podcast: Going passwordless
Something you are, or something you have, could be more important than a password you know in the near future
6 Jan 2023
Podcast transcript: Going passwordless

Podcast transcript: Going passwordless
Read the full transcript for this episode of the IT Pro Podcast
6 Jan 2023
Lab-based cyber attacks are no serious threat – yet

Lab-based cyber attacks are no serious threat – yet
There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
19 Nov 2022
Revealed: The top 200 most common passwords of 2022

Revealed: The top 200 most common passwords of 2022
While the most common passwords worldwide are largely the same, gender and region did have an effect on frequency
17 Nov 2022
Six cyber security holes you need to plug now

Six cyber security holes you need to plug now
We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
8 Nov 2022
LockBit repeats 'PR stunt' as Thales ransomware investigation reveals no breach

LockBit repeats 'PR stunt' as Thales ransomware investigation reveals no breach
The ransomware group threatened to leak stolen data on the dark web, but Thales denies any attack occurred
3 Nov 2022
Cisco announces Duo Passwordless Authentication for Single Sign On (SSO) apps

Cisco announces Duo Passwordless Authentication for Single Sign On (SSO) apps
The addition is one of several new capabilities being introduced across the company’s security portfolio
2 Nov 2022
Cyber security engineer vs analyst: What's the difference?

Cyber security engineer vs analyst: What's the difference?
We examine the differences between these two roles and the varying prospects for both career paths
28 Oct 2022
NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests

NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests
The debate around the importance of phishing tests in cyber security rages on but businesses need to be careful if they decide to embrace them, the UK…
10 Oct 2022
Microsoft to end Client Access Rules support in Exchange Online by 2023

Microsoft to end Client Access Rules support in Exchange Online by 2023
The deprecation process will begin as early as October 2022, according to reports
28 Sep 2022
WatchGuard Firebox T20-W review

WatchGuard Firebox T20-W review
This affordable desktop appliance is a great choice for protecting small offices and home workers
21 Sep 2022
Sophos XGS 116 review: A small and mighty appliance 

Sophos XGS 116 review: A small and mighty appliance
This clever and compact security gateway brings outstanding security and remote management features at a tempting price
14 Sep 2022
Gartner: Most businesses are dropping security vendors to improve cyber resiliency

Gartner: Most businesses are dropping security vendors to improve cyber resiliency
The vast majority of organisations around the world are pursuing vendor consolidation to improve security and decrease complexity
13 Sep 2022
Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts

Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts
The broken update pushed to users on Sunday morning saw the likes of Teams, Slack, Chrome, and Edge all being confused with the dangerous Hive ransomw…
5 Sep 2022
Podcast transcript: What did we learn from WannaCry?

Podcast transcript: What did we learn from WannaCry?
Read the full transcript for this episode of the IT Pro Podcast
2 Sep 2022
The IT Pro Podcast: What did we learn from WannaCry?

The IT Pro Podcast: What did we learn from WannaCry?
Five years on, WannaCry still remains one of the most impactful security incidents in recent memory
2 Sep 2022
What is threat hunting?

What is threat hunting?
Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022
What is zero trust?

What is zero trust?
How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
Will FIDO passwordless authentication save cyber security?

Will FIDO passwordless authentication save cyber security?
Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD

Retbleed hardware-level flaw brings overhead woe to Intel and AMD
‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
13 Jul 2022