IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Landmark amendments to international cyber crime treaty set to be signed next week
Marija Pejcinovic Buric, the Council of Europe Secretary General, speaks at the Council of Europe
cyber crime

Landmark amendments to international cyber crime treaty set to be signed next week

It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001
6 May 2022
Dell calls time on the age-old on-prem vs cloud rivalry
Michael Dell in conversation in 2022
hybrid cloud

Dell calls time on the age-old on-prem vs cloud rivalry

The tech giant champions multi-cloud at one of the best conferences out there, unless you’re immunosuppressed, that is – our Dell Technologies World 2…
6 May 2022
GitHub to introduce two-factor authentication by 2023
The GitHub sign in screen on a smartphone
Security

GitHub to introduce two-factor authentication by 2023

GitHub.com will require 2FA by the end of 2023, as the company works to secure the software ecosystem through improved account security
5 May 2022
Securing endpoints amid new threats
Whitepaper cover with image of female employee working at home on laptopwhitepaper
Whitepaper

Securing endpoints amid new threats

Ensuring employees have the flexibility and security to work remotely
4 May 2022
Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks
Ransomware on a red screen
ransomware

Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks

This one trick can stop ransomware executing file encryption
4 May 2022
SMBs expected to suffer as cyber security salaries equalise across the UK
Mockup of a virtual environment in which a recruiter is choosing between different candidates represented by silhouettes
Security

SMBs expected to suffer as cyber security salaries equalise across the UK

Smaller businesses stand to lose out on top talent as post-pandemic hybrid and remote working setups drive salaries closer to London levels
4 May 2022
Australian state transport agency hit by cyber attack
Sydney's skyline at dusk
cyber attacks

Australian state transport agency hit by cyber attack

It warned that scammers might try to capitalise on the incident and told customers not to respond to unsolicited contact from anyone claiming to be fr…
4 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Dell PowerStore with white background
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

New PowerStore update aims to deliver up to a 50% mixed-workload performance boost and up to 66% greater capacity
4 May 2022
Microsoft makes Defender for Business generally available
An image of a digital padlock
cyber security

Microsoft makes Defender for Business generally available

Small businesses can look forward to enterprise-grade endpoint security as well as automated investigation and remediation capabilities
3 May 2022
Phishing scam convinces US government to pay $23.5 million to cyber criminals
US Department of Defense badge mounted on a lectern
phishing

Phishing scam convinces US government to pay $23.5 million to cyber criminals

The historic case has finally reached an end with the criminals facing huge fines and jail terms
3 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
Michael Dell speaking on stage at Dell Technologies World 2022
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

The tech giant also added Cyber Recovery Services to its existing Apex portfolio and announced a multi-cloud collaboration with Snowflake Data Cloud
3 May 2022
How cyber security history repeats itself
An unlocked padlock resting on a keyboard in front of a red backdrop
Security

How cyber security history repeats itself

The prime threats to businesses continue to be the same threats we’ve seen for the past decade – and if your business isn’t prepared, you might be at …
30 Apr 2022
What is identity management?
identity head digital
identity and access management (IAM)

What is identity management?

Make sure only the right people have access to your infrastructure
29 Apr 2022
How do you become an ethical hacker?
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
What is phishing?
Email sign with a fish hook on blue digital background
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
29 Apr 2022
IT Pro News In Review: IT staff shortages, Fujitsu to sell software to Ricoh, Japanese ransom attack
Thumbnail for the IT Pro News in Review, week ending 29 Aprilvideo
Careers & training

IT Pro News In Review: IT staff shortages, Fujitsu to sell software to Ricoh, Japanese ransom attack

Catch up on the biggest headlines of the week in just two minutes
29 Apr 2022
Datadog's ASM platform unmasks attack flows at code level
Somebody using their phone in front of the Datadog logo
Security

Datadog's ASM platform unmasks attack flows at code level

The service employs distributed tracing to identify cyber criminals
29 Apr 2022
EU rules against Meta in data privacy row
A smartphone lying on a laptop displaying the Meta company logo
data protection

EU rules against Meta in data privacy row

The European Court of Justice (CJEU) says consumer groups can take legal action over data privacy breaches
29 Apr 2022
Microsoft's latest VPN-like feature brings added network privacy to Edge users
Microsoft Edge webpage from an angle
web browser

Microsoft's latest VPN-like feature brings added network privacy to Edge users

The Microsoft Edge Secure Network feature is currently available in preview and offers similar data privacy protections to Apple's Private Relay tool
29 Apr 2022
Vector Capital acquires majority ownership of WatchGuard
An image of a digital padlock
Security

Vector Capital acquires majority ownership of WatchGuard

Global private equity firm gobbles up shares from co-investors as it doubles down on its commitment to the cyber security platform provider
29 Apr 2022
Report: 80% of data breaches caused by lack of cyber security skills
A tired or stressed man at home using a laptop
data breaches

Report: 80% of data breaches caused by lack of cyber security skills

Almost two-thirds of businesses have also lost revenue as a direct result of security gaps
28 Apr 2022
Cloud marketplace Pax8 expands into Australia and New Zealand
Close up of the Australian and New Zealand flags stacked on top of each other
Managed service provider (MSP)

Cloud marketplace Pax8 expands into Australia and New Zealand

MSPs in the region can now sign up to be a Pax8 partner and purchase key products from vendors such as Acronis, Check Point, Bitdefender, and more
28 Apr 2022
Blockchain-based Gmail plugin lets users keep control over email attachments after they're sent
Gmail application icon on a smartphone screen
email delivery

Blockchain-based Gmail plugin lets users keep control over email attachments after they're sent

Document GPS email extension for Google Workspace considered world's first Gmail tokenization tool
28 Apr 2022
How governments can build resilience in a new normal
Black whitepaper cover with titlewhitepaper
Whitepaper

How governments can build resilience in a new normal

The cloud enables the flexibility public organisations need to overcome disruption
27 Apr 2022