Hacking How the hackers are using Open Source Libraries to their advantage

Ben Porter, Chief Product Officer at Instaclustr, writes about how the potential of Open Source Libraries must be balanced with …

Ransomware Defence contractor Kimchuk targeted with data-stealing ransomware

Kimchuk, a contract manufacturer of electronic and medical equipment for civil and defence companies, suffered a major ransomware attack earlier …

Insider threat How to achieve visibility and control over data access in your organisation

Ben Bulpett, EMEA Director, SailPoint, explores how organisations can safeguard against the insider threat. Today, a job is no longer for life. …

Employees Coronavirus: five ways to be a better manager when working from home

Everyone is adjusting to life during the coronavirus pandemic. For many, working from home is the new normal and poses …

Employees Coronavirus: five ways to be a better manager when working from home

Everyone is adjusting to life during the coronavirus pandemic. For many, working from home is the new normal and poses …

Cyber security Working from home risks online security and privacy – how to stay protected

Remote working can be a blessing. More time with family, less commuting, and meetings from the comfort of your living …

Data security Staying secure through COVID-19: Be vigilant and trust your people

COVID-19 is having a dramatic impact on all of our lives. The fraudsters are getting creative and many of us …

Mobile Vodafone, Deutsche Telekom & six other telcos to help EU track virus

Vodafone, Deutsche Telekom, Orange and five other telecoms providers have agreed to share mobile phone location data with the European …

Hacking How the hackers are using Open Source Libraries to their advantage

Ben Porter, Chief Product Officer at Instaclustr, writes about how the potential of Open Source Libraries must be balanced with …

Elections Why the cyber security ratings of U.S. presidential contenders matter

Paul Gagliardi, head of threat intelligence and CISO at SecurityScorecard, investigates how secure the U.S. presidential campaigns actually are and …

Surveillance Do we – the public – have a voice in the facial recognition debate?

Stephanie Hare, Author of Technology Ethics, highlights that it's difficult to know how our data is being captured, used for …

Fake news BEWARE of fake news & fraud amidst COVID-19 outbreak

As confusion over the coronavirus continues, fake news and fraud is rife: from text messages claiming to be from an …

Risk management The risks of remote working: threats to watch out for

Andrew Tsonchev, Director of Technology at Darktrace outlines the most serious threats that security teams will face over the coming …

Vulnerability What can the Citrix bug teach us about patch management and disclosure protocols?

Oliver Pinson-Roxburgh, co-founder of Bulletproof, explains what lessons should be drawn from how CVE-2019-19781's story unfolded earlier this year, and …

Phishing The COVID-19 scamming tricks to avoid!

So the scammers are taking advantage of the COVID-19 pandemic. But, of course. As reported on Sky News, experts from …

Mobile security All endpoints are equal, but are mobile endpoints being treated the same way with...

Jamie Andrews, EMEA Partner Director at Lookout, outlines the most popular tactics used by hackers to target individuals on their …