Security

Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
16 Apr 2021
US, UK say Russia was behind SolarWinds hack
Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background.
cyber attacks

US, UK say Russia was behind SolarWinds hack

President Joe Biden issues sanctions against 32 entities and officials, as well as expelling 10 diplomats
16 Apr 2021
1Password targets enterprise customers with Secrets Automation
1Password app logo on a smartphone screen
IT infrastructure

1Password targets enterprise customers with Secrets Automation

Acquisition lets password manager integrate with enterprise infrastructure
14 Apr 2021
PowerShell threats increased over 200% last year
Take command
cyber security

PowerShell threats increased over 200% last year

A new McAfee report finds PowerShell attacks driven largely by Donoff malware.
14 Apr 2021
Russia launched over a million cyber attacks in three months
Abstract silhouette of a computer hacker in front of a Russian flag
hacking

Russia launched over a million cyber attacks in three months

Unit 42 researchers found 75% of the attacks were critical
13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Graphic representation of IoT devices in businesses
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

The NAME:WRECK flaws affects four popular TCP/IP stacks
13 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO
An anonymous hacker using smartphone on the street at night
5G

5G will accelerate cyber crime, predicts former White House CIO

Speaking at Aruba Atmosphere '21, Payton warned the technology will lead to "massive cyber attacks" this year
13 Apr 2021
How to encrypt files and folders in Windows 10
Padlock over lines of binary code
encryption

How to encrypt files and folders in Windows 10

Here’s how to make your sensitive data unreadable to prying eyes
9 Apr 2021
The definitive guide to IT security
The definitive guide to IT security for MSPs - whitepaper from Liongardwhitepaper
Whitepaper

The definitive guide to IT security

Protecting your MSP and your customers
9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
Young girl learning remotely
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

The trust’s financial records have been discovered on a dark web site known to be operated by the infamous group
9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
Smart factory with robotic arms in background
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

Trend Micro’s 5G security solution identifies vulnerabilities and suspicious network behaviors
8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
WhatsApp chat on a smartphone screen
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

Hackers are posing as friends to gain users' trust
8 Apr 2021
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
8 Apr 2021
BCDR buyer's guide for MSPs
BCDR buyer's guide for MSPs - whitepaper from Dattowhitepaper
Whitepaper

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution
7 Apr 2021
The business guide to ransomware
The business guide to ransomware - whitepaper from Dattowhitepaper
ransomware

The business guide to ransomware

Everything you need to know to keep your company afloat
7 Apr 2021
Acuant joins Microsoft to enable seamless identity verification on Azure AD
A Microsoft Azure web page
Microsoft Azure

Acuant joins Microsoft to enable seamless identity verification on Azure AD

Acuant’s My Digital ID relieves users from repeatedly sharing sensitive information
6 Apr 2021
The nine best cyber security courses
An employee delivers a presentation on cyber security to her colleagues
Careers & training

The nine best cyber security courses

These courses can help you to launch a cyber security career or improve your skills
6 Apr 2021
North Korean hackers target security researchers with fake social media accounts
N. Korean flag with code
hacking

North Korean hackers target security researchers with fake social media accounts

Cyber spies also set up fake Turkish security website to entice victims
1 Apr 2021
Head of Homeland Security had his email hacked in SolarWinds attack
SolarWinds logo on the side of a building
cyber security

Head of Homeland Security had his email hacked in SolarWinds attack

Suspected Russian hackers at the center of new claims
30 Mar 2021
Harris Federation disables students' emails following ransomware attack
Email symbols with padlock against dark background
ransomware

Harris Federation disables students' emails following ransomware attack

The "temporary" move has left 37,000 students unable to access their correspondence and coursework
30 Mar 2021
Zscaler teams with CrowdStrike for remote access security
Zscaler logo on the side of a building
remote access

Zscaler teams with CrowdStrike for remote access security

The partnership offers application access control based on real-time device security analysis
29 Mar 2021
Netmask flaw allows hackers to bypass server access controls
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Network & Internet

Netmask flaw allows hackers to bypass server access controls

The vulnerability could leave thousands of networks open to server-side request forgery
29 Mar 2021