Security

Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
A chained lock situated on a laptop displaying a red screen
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

1.2GB of data was taken from the Scottish regulator's digital systems on Christmas Eve
22 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

Pulling together the most dangerous and pressing flaws that businesses need to patch
21 Jan 2021
Biden nominees highlight tough cyber security challenges
Military IT professionals in a server room
cyber security

Biden nominees highlight tough cyber security challenges

Senators warn government cyber security operations are in disarray
20 Jan 2021
Report: Security staff excluded from app development
Abstract cyber security image of a man holding a symbol of a padlock inside a shield
cyber security

Report: Security staff excluded from app development

Security professionals have little influence over how apps are secured
20 Jan 2021
Best MDM solutions 2020
A hand holding a modern smartphone over a laptop keyboard
mobile device management (MDM)

Best MDM solutions 2020

What are the best enterprise MDM tools available for securing your corporate devices?
20 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit
MalwareBytes antivirus software on a smartphone
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

They accessed company emails after abusing a dormant email protection product within the Office 365 tenant
20 Jan 2021
How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

Stronger cyber security with MITRE ATT&CK
15 Jan 2021
How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

Stronger cyber security with MITRE ATT&CK
15 Jan 2021
How LogPoint uses MITRE ATT&CK
How to improve your cyber security with MITRE ATT&CK - A LogPoint whitepaperwhitepaper
Whitepaper

How LogPoint uses MITRE ATT&CK

Stronger cyber security with MITRE ATT&CK
15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

Pulling together the most dangerous and pressing flaws that businesses need to patch
14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Mimecast logo seen displayed on a smartphone
Security

Mimecast admits hackers accessed users’ Microsoft accounts

'Sophisticated' threat actors obtained one of Mimecast's digital certificates and abused it to gain access to clients' accounts
13 Jan 2021
HITRUST partners with AWS and Microsoft to clarify shared responsibility in cloud security
Cloud with various IT components inside
cloud security

HITRUST partners with AWS and Microsoft to clarify shared responsibility in cloud security

HITRUST’s shared responsibility model addresses security and privacy challenges in the cloud
12 Jan 2021
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
12 Jan 2021
10 quick tips for identifying phishing emails
Hacker behind screen
scams

10 quick tips for identifying phishing emails

Avoid falling victim to a phishing attack with these easy tips
11 Jan 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
2020 the busiest year on record for cyber attacks against UK firms
Unknown hacker on a computer in a dark room
cyber attacks

2020 the busiest year on record for cyber attacks against UK firms

Hacking attempts surged by 20% as hackers took advantage of factors such as COVID-19 and remote working
11 Jan 2021
Red Hat acquires Kubernetes security firm StackRox
Red Hat logo and sign on open source software company office in Silicon Valley
Acquisition

Red Hat acquires Kubernetes security firm StackRox

Red Hat said it would use the deal to bolster the security of OpenShift platform
8 Jan 2021
Weekly threat roundup: Zyxel, Samsung Galaxy, Windows 10
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Zyxel, Samsung Galaxy, Windows 10

Pulling together the most dangerous and pressing flaws that businesses need to patch
7 Jan 2021
2020: Threats in review
Four key trends in the cyber-threat landscape - whitepaper from DarkTracewhitepaper
Whitepaper

2020: Threats in review

Four key trends in the cyber-threat landscape
6 Jan 2021
What is e-safety?
Child using tablet
e safety

What is e-safety?

We explain what e-safety is and how it can be managed in schools and beyond
6 Jan 2021
US government blames Russia for SolarWinds hack
The outline of the side profile of US president Donald Trump against the Russian flag
Security

US government blames Russia for SolarWinds hack

The accusation comes as SolarWinds faces legal action for failing to disclose vulnerabilities in a timely manner
6 Jan 2021
Email security threat report 2020
Email security threats of 2020 - whitepaper from Darktracewhitepaper
Whitepaper

Email security threat report 2020

Four key trends from spear fishing to credentials theft
6 Jan 2021