Explore Security
Security
Latest about Security
![Defense-in-depth: Closing gaps in security by integrating and layering solutions](https://cdn.mos.cms.futurecdn.net/KhVFpKVDkAkKUNVYFrkmtV-320-80.jpg)
Defense-in-depth
By ITPro published
whitepaper Closing gaps in security by integrating and layering solutions
![Defense-in-depth: Closing gaps in security by integrating and layering solutions](https://cdn.mos.cms.futurecdn.net/KhVFpKVDkAkKUNVYFrkmtV-320-80.jpg)
Defense-in-depth
By ITPro published
whitepaper Closing gaps in security by integrating and layering solutions
![Crisis Control: Closing security gaps with incident response and recovery](https://cdn.mos.cms.futurecdn.net/ZktBasRajhSb7BsQryPQ7m-320-80.jpg)
Crisis Control
By ITPro published
whitepaper Closing security gaps with incident response and recovery
![Meta logo pictured at Menlo Park, California.](https://cdn.mos.cms.futurecdn.net/Fvu8vCPHUjMXrnPhGThgRk-320-80.jpg)
Why Meta could face a hefty EU fine over its 'pay or consent' ad model
By Emma Woollacott published
News The European Commission said Meta is failing to offer users a valid option for equivalent services that doesn't involve tracking and targeting
![A person types at a backlit keyboard in front of a code terminal](https://cdn.mos.cms.futurecdn.net/RXLzHgwHtTmwchGUiiLJWe-320-80.jpg)
Millions of sites could’ve been exposed in the Polyfill, BootCDN, Bootcss, and Staticfile attack – and it was all orchestrated by a single operator
By Solomon Klappholz published
News Researchers have traced the source of a supply chain attack leveraging a number popular open source CDN services back to one source
![Cyber security concept image showing a digitized padlock resting on an illuminated circuit board.](https://cdn.mos.cms.futurecdn.net/uFW9gi4NuStyNXfDZrUNf9-320-80.jpg)
Cyber attacks on healthcare organizations are surging – here's why
By Solomon Klappholz published
Analysis Healthcare organizations have been targeted with spiraling costs linked to a record number of cyber attacks in recent years
![TeamViewer logo on mobile phone screen with TeamViewer written above it](https://cdn.mos.cms.futurecdn.net/J5rTBwFgLyVAdLNdhnwUC3-320-80.jpg)
Everything you need to know about the TeamViewer breach
By Solomon Klappholz published
News TeamViewer’s corporate IT environment is believed to have been accessed by Russian state-sponsored hacker collective, Midnight Blizzard
![Securing tomorrow: Maximising the value of technology in an evolving defence sector](https://cdn.mos.cms.futurecdn.net/CQVbgM8Vp6xdYdQJG2NW3T-320-80.jpg)
Securing tomorrow
By ITPro published
whitepaper Maximising the value of technology in an evolving defence sector
![A CISO's Guide to Safely Unleashing the Power of GenAI](https://cdn.mos.cms.futurecdn.net/i8x42NAf3SWy76TxK6gcuK-320-80.jpg)
A CISO's guide to safely unleashing the power of GenAI
By ITPro published
Whitepaper Safeguard against the threats of AI
![Female CISO advises colleague in a security operations center while working on desktop computers.](https://cdn.mos.cms.futurecdn.net/HQxXLWD882pD9kW3xzkk53-320-80.jpg)
CISOs plan to start downsizing security teams because of AI – but experts warn it’s a “shortsighted and dangerous" path to take
By Solomon Klappholz published
News CISOs around the world are planning on reducing headcounts as they continue to adopt AI tools, but experts warn this could be a shortsighted strategy
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.