network security
Sophos XG 230 Rev.2 review: Powerful and flexible

Sophos XG 230 Rev.2 review: Powerful and flexible
This high-performance UTM appliance boasts extensive cloud management and remote-security services
1 Apr 2021
What is SSID?

What is SSID?
We look at what SSID is and how it is used to connect devices to the internet
26 Mar 2021
Remote workforce security report
Remote workforce security report
Key challenges, security threats, and investment priorities of organisations during the pandemic
10 Mar 2021
Microsoft doubles down on zero trust security policies

Microsoft doubles down on zero trust security policies
New features across Azure, Microsoft 365 and Defender aim to protect customers against external breaches and insider threats
2 Mar 2021
National Grid plots £450 million overhaul of Britain’s fibre network

National Grid plots £450 million overhaul of Britain’s fibre network
The programme will see a network operations centre to handle maintenance, address faults and bolster security
2 Mar 2021
SolarWinds blames intern for weak ‘solarwinds123’ password

SolarWinds blames intern for weak ‘solarwinds123’ password
The password ‘solarwinds123’ was publicly accessible on GitHub for more than a year and brought to the firm's attention in 2019
1 Mar 2021
HTTP vs HTTPS: What difference does it make to security?

HTTP vs HTTPS: What difference does it make to security?
We look at the difference between the two and tell you how to switch between them
19 Feb 2021
What is network forensics?

What is network forensics?
Taking a closer look at how cyber threats are investigated at a network level
17 Feb 2021
Managing employee security risks during lockdown

Managing employee security risks during lockdown
COVID-19 doesn’t have to compromise your organisation’s security
8 Feb 2021
How to choose networking software for your business

How to choose networking software for your business
A healthy network is a productive network – and, therefore, a profitable one. Here's what to look for in a network monitoring system
5 Feb 2021
Beleaguered SolarWinds hit with fresh vulnerabilities

Beleaguered SolarWinds hit with fresh vulnerabilities
Three severe flaws across Orion and Serv-U FTP can be exploited to launch remote code execution attacks and steal data
3 Feb 2021
Security analytics for your multi-cloud deployments
Security analytics for your multi-cloud deployments
IBM Security QRadar SIEM solution brief
2 Feb 2021
Apple drops controversial firewall-bypass feature on macOS

Apple drops controversial firewall-bypass feature on macOS
Researchers claim the ContentFilterExlusionList posed a huge cyber security risk
15 Jan 2021
Channel Pro Insight: A fast guide to central network management
Channel Pro Insight: A fast guide to central network management
How to stay connected and secure with central network management
13 Jan 2021
What is public key infrastructure (PKI)?

What is public key infrastructure (PKI)?
This technology can help secure data using a number of components
12 Jan 2021
What is zero trust?

What is zero trust?
How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach

AWS CISO urges companies to adopt a zero-trust security approach
Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Russian hackers are exploiting critical VMware flaws

Russian hackers are exploiting critical VMware flaws
The vulnerabilities were patched last week, but the NSA has uncovered details of active exploitation
8 Dec 2020
2FA bypass flaw on cPanel threatens the security of 70 million domains

2FA bypass flaw on cPanel threatens the security of 70 million domains
Hackers were able to try as many 2FA codes as they wanted using brute force methods before landing on the right one
25 Nov 2020
Secure your Wi-Fi against hackers in 10 steps

Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Microsoft expands Defender capabilities for Linux systems

Microsoft expands Defender capabilities for Linux systems
Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online

CMS platforms succumb to KashmirBlack botnet as businesses rush online
Businesses warned to prioritise security as coronavirus forces many to ply their trade digitally
22 Oct 2020
Mobile browser flaw exposes users to spoofing attacks

Mobile browser flaw exposes users to spoofing attacks
Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020