Hacking How to protect elections amid the coronavirus pandemic

At least seven states have postponed their presidential primaries in the face of the coronavirus pandemic. That has raised concerns …

Privacy ‘Zoombombers’ want to troll your online meetings. Here’s how to stop them

“Zoombombing” in case you haven’t heard, is the unsavoury practice of posting distressing comments, pictures or videos after gatecrashing virtual …

Business Continuity Entire companies working from home – how businesses can master the new challenges 

Ryan Weeks, CISO at Datto, provides guidance and best practices for CIOs to help ensure a seamless and secure migration …

Cloud How criminals are exploiting the cloud with multi-stage phishing attacks

Mattias Deny, VP Managed Security Services EMEA at Trustwave, outlines how attackers are using multi-stage phishing attacks targeting online cloud services. Just …

Business Continuity Steps to maintain business continuity during the corona pandemic

Tim Mackey, principal security strategist at the Synopsys CyRC (Cybersecurity Research Center), says it's essential to identify areas of IT weakness before …

Cyber attack Coronavirus pandemic has unleashed a wave of cyber attacks – here’s how to protect...

While most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown. …

Apps What’s being learned from a free coronavirus symptom-tracking app being used by two million...

The global COVID-19 pandemic caused by the novel SARS-CoV-2 coronavirus is a public health emergency. In just under three months, …

Bitcoin While coronavirus rages, bitcoin has made a leap towards the mainstream

Anyone holding bitcoin would have watched the market with alarm in recent weeks. The virtual currency, whose price other cryptocurrencies …

Cyber risk Remote working: the new normal for many, but it comes with hidden risks –...

Many of us have had little choice but to resort to remote working in the midst of the coronavirus pandemic. …

Hacking How the hackers are using Open Source Libraries to their advantage

Ben Slater, Chief Product Officer at Instaclustr, writes about how the potential of Open Source Libraries must be balanced with …

Data privacy How to achieve visibility and control over data access in your organisation

Ben Bulpett, EMEA Director, SailPoint, explores how organisations can safeguard against the insider threat. Today, a job is no longer for life. …

Employees Coronavirus: five ways to be a better manager when working from home

Everyone is adjusting to life during the coronavirus pandemic. For many, working from home is the new normal and poses …