IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

enterprise security

Microsoft to end Client Access Rules support in Exchange Online by 2023
A laptop on a table with the Microsoft Exchange logo displayed
mail servers

Microsoft to end Client Access Rules support in Exchange Online by 2023

The deprecation process will begin as early as October 2022, according to reports
28 Sep 2022
WatchGuard Firebox T20-W review
A photograph of the WatchGuard Firebox T20-W
unified threat management (UTM)

WatchGuard Firebox T20-W review

This affordable desktop appliance is a great choice for protecting small offices and home workers
21 Sep 2022
Sophos XGS 116 review: A small and mighty appliance
A photograph of the Sophos XGS 116
unified threat management (UTM)

Sophos XGS 116 review: A small and mighty appliance

This clever and compact security gateway brings outstanding security and remote management features at a tempting price
14 Sep 2022
Gartner: Most businesses are dropping security vendors to improve cyber resiliency
A series of digital padlocks layered on top of each other
Security

Gartner: Most businesses are dropping security vendors to improve cyber resiliency

The vast majority of organisations around the world are pursuing vendor consolidation to improve security and decrease complexity
13 Sep 2022
Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts
The Windows (start menu) key on a keyboard
cyber security

Microsoft Defender causes 'mass confusion' after legitimate apps trigger ransomware alerts

The broken update pushed to users on Sunday morning saw the likes of Teams, Slack, Chrome, and Edge all being confused with the dangerous Hive ransomw…
5 Sep 2022
Podcast transcript: What did we learn from WannaCry?
Podcast transcript: What did we learn from WannaCry?
WannaCry

Podcast transcript: What did we learn from WannaCry?

Read the full transcript for this episode of the IT Pro Podcast
2 Sep 2022
The IT Pro Podcast: What did we learn from WannaCry?
The IT Pro Podcast: What did we learn from WannaCry?
WannaCry

The IT Pro Podcast: What did we learn from WannaCry?

Five years on, WannaCry still remains one of the most impactful security incidents in recent memory
2 Sep 2022
Six cyber security holes you need to plug now
Graphic with hexagonal tiles with a lockpad and one tile with an unlocked lock pad against a red background
cyber security

Six cyber security holes you need to plug now

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
29 Jul 2022
What is threat hunting?
Somebody using a red-backlit keyboard on their laptop
cyber security

What is threat hunting?

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
Will FIDO passwordless authentication save cyber security?
A digital padlock representing security
cyber security

Will FIDO passwordless authentication save cyber security?

Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
A graphic of a red CPU with a white skull and crossbones on it, placed upon a grey background
Hardware

Retbleed hardware-level flaw brings overhead woe to Intel and AMD

‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
13 Jul 2022
What is cyber insurance?
Graphic with light pastel colours and a padlock overlaid with binary
cyber security

What is cyber insurance?

In an age of increasingly devastating cyber attacks, many businesses are looking to cyber insurance to cushion the financial blow
13 Jul 2022
NCSC and ICO chiefs plead with lawyers to stop making ransomware payments
A close up image of a smartphone with the ICO webpage displayed on screen
ransomware

NCSC and ICO chiefs plead with lawyers to stop making ransomware payments

The two UK authorities say misconceptions around ICO fines are jeopardising the integrity of UK cyber security, in a direct appeal to the Law Society
8 Jul 2022
The new wave of cyber security threats facing critical national infrastructure (CNI)
Power lines with a computerized grid surrounding them
cyber security

The new wave of cyber security threats facing critical national infrastructure (CNI)

CNI is increasingly becoming a viable target, thanks to a litany of new malware strains, with cyber attacks threatening to have serious consequences
8 Jul 2022
Six cyber security companies to watch in 2022
Abstract image representing cloud cyber security showing a cloud with a keyhole in the middle in front of a yellow and blue circuit board background
cyber security

Six cyber security companies to watch in 2022

The companies breaking new ground in data retention, software development, training, risk management, and automation
5 Jul 2022
WatchGuard Firebox M590 review: Big red network security
A photograph of the WatchGuard Firebox M590
unified threat management (UTM)

WatchGuard Firebox M590 review: Big red network security

A powerful mid-range UTM appliance with top-notch security features at a sensible price
27 Jun 2022
What is metaverse security?
Somebody wearing a headset with green and blue lights shone on them
Security

What is metaverse security?

As the metaverse evolves, businesses need to think differently about virtual security to protect their IT infrastructure, staff, and customers
9 Jun 2022
Cyber security companies ‘must remember who the enemies are’
A hacker in a darkened room with digital maps and computer equipment
cyber security

Cyber security companies ‘must remember who the enemies are’

Tech giants must collaborate more with the wider industry, WithSecure’s CEO urges, as he lays bare European anxieties
6 Jun 2022
WithSecure needs a major rethink to survive in the enterprise security market
Graphic of a man holding a padlock attached to a lightbulb
enterprise security

WithSecure needs a major rethink to survive in the enterprise security market

A flatlining consultancy business means the F-Secure spin-off is up against the ropes before it's entered the ring
27 May 2022
Microsoft announces new business security services led by in-house experts
A shield with a keyhole on a radar system denoting cyber security
enterprise security

Microsoft announces new business security services led by in-house experts

The new services will see Microsoft's security experts providing hands-on, proactive threat hunting for businesses unable to fully build out a SOC due…
9 May 2022
How cyber security history repeats itself
An unlocked padlock resting on a keyboard in front of a red backdrop
Security

How cyber security history repeats itself

The prime threats to businesses continue to be the same threats we’ve seen for the past decade – and if your business isn’t prepared, you might be at …
30 Apr 2022
Vulnerable infrastructure operators are 'switching off' security to avoid downtime
A photo of the interior of a factory
Security

Vulnerable infrastructure operators are 'switching off' security to avoid downtime

Out-of-date systems are vulnerable to cyber attacks and lack purpose-built products to adequately protect them
22 Apr 2022