Articles: 21550 Results Search help Filter results »
Order By: Relevance | Date

Infographic: The 2020 threat landscape – how prepared are you?

This infographic highlights what you believe will be the major cyber threats to your business over t...

Fake Zoom notifications used to steal Office 365 credentials

Hackers use spoofed video conferencing messages to steal Office 365 credentials as part of a ransomw...

Cyber investment up 940% during pandemic - but falls for seed startups

940% increase in cyber funding for startups during lockdown but primarily for growth phase, while se...

A case study: Boosting Buckinghamshire Council’s cybersecurity during a pandemic

By enhancing the security monitoring of its infrastructure the Council has been able to protect its ...

Post-Covid-19 it’s make or break for employee security

Organisations need to create employee user journeys as they would a customer journey, using dynamic ...

Service providers under attack: US Secret Service warns of ransomware threat to MSPs

Cyberattacks related to compromised managed service providers see upswing; even though you rely on a...

Quantum isn't here yet - but it also kind of is

Implement a crypto-agility approach to mitigate the impact of quantum and deploy algorithms that can...

Babylon Health: the right way to handle a data breach

We judge a business on the incident itself but also how it is handled. The way a business conducts i...

LinkedIn copied evey keystroke & Reddit snoops too - new feature in iOS14 reveals

Universal clipboard feature in iOS14 exposes how apps snoop on smartphone users, with LinkedIn found...

Urgent patching advised for BIG-IP configuration interface flaw

Urgent patching advised following vulnerability found in configuration interface of the BIG-IP deliv...

Filter results

Section

Date