enterprise security
Six cyber security holes you need to plug now

Six cyber security holes you need to plug now
We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
29 Jul 2022
What is threat hunting?

What is threat hunting?
Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022
What is zero trust?

What is zero trust?
How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
Will FIDO passwordless authentication save cyber security?

Will FIDO passwordless authentication save cyber security?
Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD

Retbleed hardware-level flaw brings overhead woe to Intel and AMD
‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
13 Jul 2022
What is cyber insurance?

What is cyber insurance?
In an age of increasingly devastating cyber attacks, many businesses are looking to cyber insurance to cushion the financial blow
13 Jul 2022
NCSC and ICO chiefs plead with lawyers to stop making ransomware payments

NCSC and ICO chiefs plead with lawyers to stop making ransomware payments
The two UK authorities say misconceptions around ICO fines are jeopardising the integrity of UK cyber security, in a direct appeal to the Law Society
8 Jul 2022
The new wave of cyber security threats facing critical national infrastructure (CNI)

The new wave of cyber security threats facing critical national infrastructure (CNI)
CNI is increasingly becoming a viable target, thanks to a litany of new malware strains, with cyber attacks threatening to have serious consequences
8 Jul 2022
Six cyber security companies to watch in 2022

Six cyber security companies to watch in 2022
The companies breaking new ground in data retention, software development, training, risk management, and automation
5 Jul 2022
WatchGuard Firebox M590 review: Big red network security

WatchGuard Firebox M590 review: Big red network security
A powerful mid-range UTM appliance with top-notch security features at a sensible price
27 Jun 2022
What is metaverse security?

What is metaverse security?
As the metaverse evolves, businesses need to think differently about virtual security to protect their IT infrastructure, staff, and customers
9 Jun 2022
Cyber security companies ‘must remember who the enemies are’

Cyber security companies ‘must remember who the enemies are’
Tech giants must collaborate more with the wider industry, WithSecure’s CEO urges, as he lays bare European anxieties
6 Jun 2022
WithSecure needs a major rethink to survive in the enterprise security market

WithSecure needs a major rethink to survive in the enterprise security market
A flatlining consultancy business means the F-Secure spin-off is up against the ropes before it's entered the ring
27 May 2022
Microsoft announces new business security services led by in-house experts

Microsoft announces new business security services led by in-house experts
The new services will see Microsoft's security experts providing hands-on, proactive threat hunting for businesses unable to fully build out a SOC due…
9 May 2022
How cyber security history repeats itself

How cyber security history repeats itself
The prime threats to businesses continue to be the same threats we’ve seen for the past decade – and if your business isn’t prepared, you might be at …
30 Apr 2022
Vulnerable infrastructure operators are 'switching off' security to avoid downtime

Vulnerable infrastructure operators are 'switching off' security to avoid downtime
Out-of-date systems are vulnerable to cyber attacks and lack purpose-built products to adequately protect them
22 Apr 2022
UK retailer The Works suffers ransomware attack leading to store closures

UK retailer The Works suffers ransomware attack leading to store closures
An employee falling victim to a malicious phishing email facilitated the attack but customer payment data has not been compromised
5 Apr 2022
The sweet spot of modern enterprise computing
The sweet spot of modern enterprise computing
Achieve security, reliability, scalability, and sustainability with hybrid IT infrastructure
1 Apr 2022
Is Kaspersky still safe to use?

Is Kaspersky still safe to use?
Western nations have, once again, warned against using the Russian cyber security firm's products, but how reasonable are their claims?
1 Apr 2022
WatchGuard Firebox T40-W review: Powerful yet classy

WatchGuard Firebox T40-W review: Powerful yet classy
A powerful desktop security appliance with classy remote monitoring and configuration services
30 Mar 2022
How to implement passwordless authentication

How to implement passwordless authentication
Worried about leaked credentials? We explain how to shut down the risk by ditching passwords entirely
30 Mar 2022
F-Secure launches WithSecure, spinning off entire enterprise portfolio

F-Secure launches WithSecure, spinning off entire enterprise portfolio
After years of trying to integrate business and consumer streams, F-Secure signals a complete split will help both new entities focus on their custome…
22 Mar 2022
Former Apple worker alleged to have defrauded company out of $10 million

Former Apple worker alleged to have defrauded company out of $10 million
The man faces five federal charges after he is said to have exploited his position in Apple's Global Service Supply Chain
21 Mar 2022