Security
Show me:
- botnets
- biometrics
- antivirus
- Advanced Encryption Standard (AES)
- ethical hacking
- firewalls
- hacking
- unified threat management (UTM)
- network security
- National Cyber Security Centre (NCSC)
- malware
- laptop security
- cross-site scripting (XSS)
- internet security
- bugs
- information security (InfoSec)
- cyber attacks
- identity theft
- encryption
- identity and access management (IAM)
- cyber security
- zero-day exploit
- WannaCry
- vulnerability
- two-factor authentication (2FA)
- exploits
- trojans
- touch ID
- enterprise security
- The Shadow Brokers (TSB)
- endpoint security
- SSL & SSL certificates
- spyware
- e safety
- social engineering
- cyber warfare
- single sign-on (SSO)
- distributed denial of service (DDOS)
- security, information and event management (SIEM)
- scams
- cyber terrorism
- ransomware
- cyber crime
- Privacy Shield
- data breaches
- privacy
- data encryption standards (DES)
- phishing
- denial of service (DOS)
- penetration testing
Landmark amendments to international cyber crime treaty set to be signed next week

Landmark amendments to international cyber crime treaty set to be signed next week
It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001
6 May 2022
Dell calls time on the age-old on-prem vs cloud rivalry

Dell calls time on the age-old on-prem vs cloud rivalry
The tech giant champions multi-cloud at one of the best conferences out there, unless you’re immunosuppressed, that is – our Dell Technologies World 2…
6 May 2022
GitHub to introduce two-factor authentication by 2023

GitHub to introduce two-factor authentication by 2023
GitHub.com will require 2FA by the end of 2023, as the company works to secure the software ecosystem through improved account security
5 May 2022
Securing endpoints amid new threats
Securing endpoints amid new threats
Ensuring employees have the flexibility and security to work remotely
4 May 2022
Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks

Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks
This one trick can stop ransomware executing file encryption
4 May 2022
SMBs expected to suffer as cyber security salaries equalise across the UK

SMBs expected to suffer as cyber security salaries equalise across the UK
Smaller businesses stand to lose out on top talent as post-pandemic hybrid and remote working setups drive salaries closer to London levels
4 May 2022
Australian state transport agency hit by cyber attack

Australian state transport agency hit by cyber attack
It warned that scammers might try to capitalise on the incident and told customers not to respond to unsolicited contact from anyone claiming to be fr…
4 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
New PowerStore update aims to deliver up to a 50% mixed-workload performance boost and up to 66% greater capacity
4 May 2022
Microsoft makes Defender for Business generally available

Microsoft makes Defender for Business generally available
Small businesses can look forward to enterprise-grade endpoint security as well as automated investigation and remediation capabilities
3 May 2022
Phishing scam convinces US government to pay $23.5 million to cyber criminals

Phishing scam convinces US government to pay $23.5 million to cyber criminals
The historic case has finally reached an end with the criminals facing huge fines and jail terms
3 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
The tech giant also added Cyber Recovery Services to its existing Apex portfolio and announced a multi-cloud collaboration with Snowflake Data Cloud
3 May 2022
How cyber security history repeats itself

How cyber security history repeats itself
The prime threats to businesses continue to be the same threats we’ve seen for the past decade – and if your business isn’t prepared, you might be at …
30 Apr 2022
What is identity management?

What is identity management?
Make sure only the right people have access to your infrastructure
29 Apr 2022
How do you become an ethical hacker?

How do you become an ethical hacker?
We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
Datadog's ASM platform unmasks attack flows at code level

Datadog's ASM platform unmasks attack flows at code level
The service employs distributed tracing to identify cyber criminals
29 Apr 2022
EU rules against Meta in data privacy row

EU rules against Meta in data privacy row
The European Court of Justice (CJEU) says consumer groups can take legal action over data privacy breaches
29 Apr 2022
Microsoft's latest VPN-like feature brings added network privacy to Edge users

Microsoft's latest VPN-like feature brings added network privacy to Edge users
The Microsoft Edge Secure Network feature is currently available in preview and offers similar data privacy protections to Apple's Private Relay tool
29 Apr 2022
Vector Capital acquires majority ownership of WatchGuard

Vector Capital acquires majority ownership of WatchGuard
Global private equity firm gobbles up shares from co-investors as it doubles down on its commitment to the cyber security platform provider
29 Apr 2022
Report: 80% of data breaches caused by lack of cyber security skills

Report: 80% of data breaches caused by lack of cyber security skills
Almost two-thirds of businesses have also lost revenue as a direct result of security gaps
28 Apr 2022
Cloud marketplace Pax8 expands into Australia and New Zealand

Cloud marketplace Pax8 expands into Australia and New Zealand
MSPs in the region can now sign up to be a Pax8 partner and purchase key products from vendors such as Acronis, Check Point, Bitdefender, and more
28 Apr 2022
Blockchain-based Gmail plugin lets users keep control over email attachments after they're sent

Blockchain-based Gmail plugin lets users keep control over email attachments after they're sent
Document GPS email extension for Google Workspace considered world's first Gmail tokenization tool
28 Apr 2022
How governments can build resilience in a new normal
How governments can build resilience in a new normal
The cloud enables the flexibility public organisations need to overcome disruption
27 Apr 2022