IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Why technology, cyber and privacy risk management are critical for digital transformation
Whitepaper cover with green title over an image of two glasses-wearing colleagues sat both looking at a laptop with coffee cup in the foregroundwhitepaper
Whitepaper

Why technology, cyber and privacy risk management are critical for digital transformation

How ServiceNow Integrated Risk Management helps you embrace the digital future
7 Feb 2023
Take control of diverse and rapidly evolving enterprise risks
Whitepaper cover with image of female working at a computer with blurred image of tables and chairs in backgroundwhitepaper
Whitepaper

Take control of diverse and rapidly evolving enterprise risks

Effectively manage and report on risk and compliance
7 Feb 2023
The Forrester Wave™: Third party risk management platforms
Whitepaper cover with title, logo and contributor image on black band above the summarywhitepaper
Whitepaper

The Forrester Wave™: Third party risk management platforms

The 12 providers that matter the most and how they stack up
7 Feb 2023
Creating a proactive, risk-aware defence in today's dynamic risk environment
Whitepaper cover with green title over image of a glasses-wearing businessman looking at the camera holding a laptopwhitepaper
Whitepaper

Creating a proactive, risk-aware defence in today's dynamic risk environment

Agile risk management starts with a common language
7 Feb 2023
Nine steps to proactive manage data privacy and protection
Whitepaper cover with image of female employee wearing glasses, smiling at camera whitepaper
Whitepaper

Nine steps to proactive manage data privacy and protection

Build trust with your employees, customers, and third parties
7 Feb 2023
Online banks servicing UK's SMBs found to have 'serious' security flaws
Mockup image with padlocks to symbolise a cyber security vulnerability
Security

Online banks servicing UK's SMBs found to have 'serious' security flaws

TSB and Virgin Money were both ranked bottom of a study examining security practices at leading UK banks
7 Feb 2023
Tips for Boosting your Organisation’s Security Posture with Encryption
A person typing on a laptop with their right hand while holding a see through padlock in their left
Sponsored

Tips for Boosting your Organisation’s Security Posture with Encryption

Encryption should be as much a part of your cyber security as firewalls and antimalware
6 Feb 2023
Warning issued over ransomware attacks targeting VMware ESXi servers globally
The entrance sign at VMware's headquarters in Palo Alto
cyber attacks

Warning issued over ransomware attacks targeting VMware ESXi servers globally

Businesses have been urged to patch the two-year-old vulnerability amidst heightened ransomware threats
6 Feb 2023
ION Trading reportedly pays LockBit ransom demands
Ransomware mockup with dark red colour scheme, a lock denoting encryption, and binary code set in the backdrop
ransomware

ION Trading reportedly pays LockBit ransom demands

Paying ransomware groups is a highly discouraged practice but has been historically sanctioned in the most severe cases
6 Feb 2023
Windows 10 users locked out of devices by unskippable Microsoft 365 advert
Windows 10 desktop on an open laptop
bugs

Windows 10 users locked out of devices by unskippable Microsoft 365 advert

Entering payment information was the only way for some to enter their own PCs
3 Feb 2023
Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout
A digital fingerprint with blue data streaming upwards from it
Policy & legislation

Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout

For years the UK government has longed for a fully functional digital identity system, but it isn't helping those who are crying out to build it
2 Feb 2023
Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status
Someone holding a padlock in front of the Microsoft logo
Security

Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status

Proofpoint research found that hackers deliberately abused verification procedures to dupe firms with malicious apps
1 Feb 2023
What is Apple's T2 security chip?
An Apple Mac sat on an office bench
components

What is Apple's T2 security chip?

Apple’s T2 security chip powers an array of security features in Macs including biometric login and data encryption
1 Feb 2023
Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay
A person at a computer looking dejected with one hand on their head staring at computer code
cyber crime

Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay

Paid leave, competitive salaries, and ‘friendly team’ environments were among the benefits highlighted by dark web job ads
31 Jan 2023
Yandex data breach reveals source code littered with racist language
Yandex logo on a self-driving car
data breaches

Yandex data breach reveals source code littered with racist language

Yandex source code for a range of key services was leaked to a popular hacker forum last week
30 Jan 2023
10 million customers exposed in JD Sports cyber attack
View of the exterior of a branch of JD sports fashion store
cyber attacks

10 million customers exposed in JD Sports cyber attack

The sports fashion retailer has urged customers to be “on the look-out" for scam emails in the wake of the incident
30 Jan 2023
US extradites French ShinyHunters hacker, faces 123 years in prison
A hacker wearing black gloves using a laptop keyboard
hacking

US extradites French ShinyHunters hacker, faces 123 years in prison

The hacker is believed to be a member of the hacking group known for its spree of data breaches across 2020 and 2021
30 Jan 2023
The IT Pro Podcast: The problem with APIs
The IT Pro Podcast logo with the episode number 158 and title 'The problem with APIs'
application programming interface (API)

The IT Pro Podcast: The problem with APIs

With API attacks on the rise, knowing your attack surface is crucial
27 Jan 2023
Podcast transcript: The problem with APIs
The IT Pro Podcast logo with subheading 'Transcript' and the episode title 'The problem with APIs'
application programming interface (API)

Podcast transcript: The problem with APIs

Read the full transcript for this episode of the IT Pro Podcast
27 Jan 2023
Bitwarden users raise alarm over 'highly convincing' Google malvertising risks
Malware in code
Security

Bitwarden users raise alarm over 'highly convincing' Google malvertising risks

The volume of fake ads impersonating popular software has increased significantly in recent months
27 Jan 2023
FBI's landmark Hive ransomware takedown 'a drop in the ocean'
Abstract image of a ghost on a digital screen
cyber crime

FBI's landmark Hive ransomware takedown 'a drop in the ocean'

A huge win for law enforcement, but the 'hacking back' takedown of Hive's domain is just a small drop in the expansive ransomware ocean
27 Jan 2023
CISA: Phishing campaign targeting US federal agencies went undetected for months
Abstract image of a fishing hook through a red email to represent a phishing attack
phishing

CISA: Phishing campaign targeting US federal agencies went undetected for months

Threat actors used legitimate remote access software to maliciously target federal employees
26 Jan 2023
Dutch hacker steals data from virtually entire population of Austria
The Austrian parliament building in Vienna
data breaches

Dutch hacker steals data from virtually entire population of Austria

The data was stolen from a misconfigured cloud database found by the attacker through a search engine
26 Jan 2023