IT security



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : IT security
-
February 25, 2021
25
Feb'21
NCSC Cyber Action Plan emphasises SME security
NCSC self-assessment tool launched to help sole traders and micro-businesses tackle their cyber security challenges
-
February 25, 2021
25
Feb'21
GCHQ sets out rules of the road for AI in cyber
A paper produced by GCHQ shows how the intelligence agency can use artificial intelligence responsibly as a tool to protect the UK’s national security
-
February 25, 2021
25
Feb'21
Npower shuts off app after credential stuffing attack
Npower customers will have to log in to their accounts on its website after its app was withdrawn following a security breach
-
February 25, 2021
25
Feb'21
MHRA and other agencies to offer new resources for scam victims
New landing page resources will replace .uk domains suspended for criminal activity to help members of the public access appropriate guidance
In Depth : IT security
-
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
Guide to cloud security management and best practices
This cloud security guide explains the challenges facing enterprises today, best practices for securing and managing SaaS, IaaS and PaaS, and comparisons of cloud-native security tools. Continue Reading
Blog Posts : IT security
-
Industry concerns over government digital identity plans risk a confusing outcome for users
A flurry of recent activity suggests the government is ramping up its plans for the long-awaited demise of Gov.uk Verify, its failed attempt to produce a digital identity system for online public ... Continue Reading
-
The WFH ‘New Normal’ is nothing of the sort
At least, not yet. The world is still in the very abnormal grip of a pandemic, and even with widespread vaccination we will be defending ourselves against the fear of further outbreaks for months, ... Continue Reading
-
WFH: Creating A Change In Network Infrastructure
As promised in a recent blog focusing on Cato Networks’ recent customer survey results - “The 2021 Networking Survey The Future of Enterprise Networking and Security: Are You Ready For The Next ... Continue Reading
Opinion : IT security
-
Rogue drones beware: We’re here to ground you
Eugene Kaspersky exclusively lifts the lid on a mysterious, shiny device that’s been sitting in his office Continue Reading
-
Vaccine passports highlight social impact of systems design
Vaccine or immunity passports are an opportunity to advance the design of trustworthy digital systems, but much more work still needs to be done Continue Reading
-
Security Think Tank: Towards a united state of security
As US president Joe Biden sets out his agenda for the next four years, we consider the opportunities for renewed international collaboration on cyber security, what aspects of cyber Biden should focus on, and ask how the industry can make its voice heard Continue Reading
Videos : IT security
-
How Zoom is keeping pace with demand for conferencing tools
Magnus Falk, CIO advisor at Zoom, offers insights on how the company is scaling up its resources to meet the growing usage of its service
-
CW500 Interview: Jonathan Moreira, CTO of PrimaryBid.com
In this CW500 video, Jonathan Moreira, CTO of PrimaryBid.com, gives a fintech startup’s perspective on the security challenges small businesses can face when adopting new technologies.
-
CW500 Interview: Paddy Francis, CTO, Airbus CyberSecurity
In this CW500 video, Paddy Francis, CTO, Airbus CyberSecurity shares his advice and experiences of keeping tabs on security when trying to introduce emerging digital technologies into large organisations.