IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cyber security

Carnival hit with $5 million fine over cyber security violations
A cruise ship on the ocean water with a sunset in the background
cyber security

Carnival hit with $5 million fine over cyber security violations

The cruise line operator was criticised for failing to implement multi-factor authentication and failing to conduct cyber security training for its st…
27 Jun 2022
Okta sets aside $1 million to support cyber security training for non-profits
Okta company logo appearing on a smartphone which is placed upon a Windows laptop's keyboard
cyber security

Okta sets aside $1 million to support cyber security training for non-profits

One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber security
23 Jun 2022
SolarWinds details 'next generation' software development process
Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background.
Software

SolarWinds details 'next generation' software development process

The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020
23 Jun 2022
Best free malware removal tools 2022
Malware spotted in red code on black background
Security

Best free malware removal tools 2022

Worried your device is infected? Here are the tools you need to get rid of malicious software
22 Jun 2022
How to react to a data breach
Open padlock on circuit board
Security

How to react to a data breach

Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breach
22 Jun 2022
Delivery firm Yodel disrupted by cyber attack
Delivery van with Yodel logo photographed through a shop door frame
cyber attacks

Delivery firm Yodel disrupted by cyber attack

The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
21 Jun 2022
Avira Free Security review: An effective antimalware suite, but heavy on the marketing
A screenshot of Avira Free Security's main dashboard
antivirus

Avira Free Security review: An effective antimalware suite, but heavy on the marketing

It’s hard to fully appreciate Avira’s malware protection when the packaging feels so manipulative
21 Jun 2022
Security BSides commits to greater conference diversity after speaker backlash
A close up of a man stood at lectern speaking at business conference
cyber security

Security BSides commits to greater conference diversity after speaker backlash

A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland
21 Jun 2022
Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive
A close up photo of a smartphone screen with a shortcut for the OneDrive app displayed
ransomware

Proofpoint details 'dangerous' ransomware flaw in SharePoint and OneDrive

Functionality allows ransomware to encrypt files stored on SharePoint and OneDrive to make them potentially unrecoverable, vendor says
17 Jun 2022
Ubuntu Core 22 is now generally available for IoT and edge devices
A city skyline at dusk overlaid with graphics to show an IoT network
Internet of Things (IoT)

Ubuntu Core 22 is now generally available for IoT and edge devices

The new release brings security updates and support for a fully preemptible kernel
16 Jun 2022
A guide to cyber security certification and training
Network and security
Careers & training

A guide to cyber security certification and training

Cyber security skills are in demand from every organisation, but what training and certification is needed?
16 Jun 2022
Deepfake attacks expected to be next major threat to businesses
An abstract image showing two digital faces looking at each other
phishing

Deepfake attacks expected to be next major threat to businesses

Cisco’s cyber security experts agreed that social norms may also become “super weird” as a result
16 Jun 2022
Microsoft silent patches called “a grossly irresponsible policy”
The entrance to one of Microsoft's offices
cyber security

Microsoft silent patches called “a grossly irresponsible policy”

Cyber security company Tenable said that the tech giant is putting customers at risk after it found two bugs in Microsoft Azure analytics software, on…
15 Jun 2022
Microsoft bolsters threat intelligence capabilities with Miburo acquisition
Microsoft sign on a building
cyber attacks

Microsoft bolsters threat intelligence capabilities with Miburo acquisition

Cyber threat and research firm will tackle malicious foreign information campaigns as part of Microsoft’s Customer Security and Trust organization
15 Jun 2022
Businesses need to be more aggressive with their cyber security, Cisco warns
Abstract image of a skull inside computer code
cyber security

Businesses need to be more aggressive with their cyber security, Cisco warns

Government warnings of Ukraine-Russia cyber war spillover must be heeded in order to stay safe
15 Jun 2022
What is phishing as a service (Phaas)?
Graphic representing phishing with a hacker stealing data from one computer to anotheri
cyber security

What is phishing as a service (Phaas)?

With phishing as a service attacks surging, we explain what this low-cost, off-the-shelf method of targeting businesses is and why it’s growing in pop…
15 Jun 2022
Atos looks to split up cyber security division as CEO exits
Departing CEO Rodolphe Belmer standing in front of the grey BullSequana XH3000 supercomputer
Business strategy

Atos looks to split up cyber security division as CEO exits

The company is set to split into two but so far the news hasn’t been taken well by investors as shares are down by nearly 20%
14 Jun 2022
How rural businesses can overcome their cyber security handicaps
Digital lines imposed onto a rural business in the sun
Security

How rural businesses can overcome their cyber security handicaps

From a false sense of safety to fewer resources, rural organisations face unique cyber security challenges that need to be addressed
13 Jun 2022
How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most effective, methods of cyber attack
10 Jun 2022
Kali Linux creators announce free cyber security sessions delivered live on Twitch
Code appearing on a screen while running pentesting processes to analyse a server
penetration testing

Kali Linux creators announce free cyber security sessions delivered live on Twitch

The brand-new initiative is aimed at reaching more aspiring certified pen-testers through twice-weekly livestreamed lessons
9 Jun 2022
Kaspersky Free review: Effective and lightweight – everything you want from a free antivirus solution
A screenshot of Kaspersky Free's main dashboard
antivirus

Kaspersky Free review: Effective and lightweight – everything you want from a free antivirus solution

It’ll be a real shame if politics means people missing out on this top-class security tool
8 Jun 2022
IT Pro 20/20: Disrupting cyber security
A promo image for issue 29 of IT Pro 20/20 showing a close up of a scanned finger print
cyber security

IT Pro 20/20: Disrupting cyber security

Issue 29 looks at the companies and trends aiming to shake up the industry in 2022
8 Jun 2022
Network detection and response market to hit $5.3bn by 2028
Finger pointing towards malware on a piece of code
network security

Network detection and response market to hit $5.3bn by 2028

North America is estimated to hold the largest market share over the forecast period
8 Jun 2022