Cybercrime

Cybercrime | News, how-tos, features, reviews, and videos

Businessman holding shield protect icon. Concept about protection from hacking
A download now button with the front page of Peerspot’s paper ‘Advanced Threat Protection’

Digital Binary Code on Dark Red BG with World Map

Which countries and industries are suffering the worst cyber attacks?

Research reveals the most cyber insecure countries in the world and the type of cybercrimes they are facing.

There is a lock against a dark blue background. concept of cybersecurity.

Strengthening cybersecurity with digital twin thinking

Neo4j’s Maya Natarajan explains how graph technology can help you potentially get ahead of the hackers

Businessman walking on twisted rope high in sky

Removing security complexity to combat cyber threats

Businesses are struggling with an overwhelming, and increasingly complex and confusing cyber world. Ian McShane, Field CTO at Arctic Wolf looks at how cyber simplicity is the key for businesses to move forward with their security...

IDGConnect_UK_businesses_cyber_threats_shutterstock_1978834034_1200x800

UK businesses struggle with cyber threats

The 3 key threats that UK businesses should watch out for are geopolitical hacking, vulnerable developer environments, and machine identity outages. Each of these pose unique problems to business leaders that, if left unattended, can...

A criminal lock on a cloud that’s stuck behind chains with a red binary background

Hacking the cloud: why APIs are now a top threat

The Application Programming Interface (API) is now integral to many services but it’s also a key target for attackers. Jason Kent, Hacker in Residence at Cequence Security, looks at why insecure APIs are now topping threat charts.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

IDGConnect_worlds_worst_passwords_shutterstock_1819491845_1200x800

What are the world’s worst passwords?

World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.

IDGConnect_cyber_prevention_mitigation_security_shutterstock_2005877624_1200x800

Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?

IDGConnect_bigtech_cyber_defense_shutterstock_2075073256_1200x800

The role of Big Tech in cyber defence

Cyber warfare has reached new levels and governments are now turning to Big Tech to strengthen their cyber defence.

IDGConnect_cyber_coldwar_cyberattack_shutterstock_308760125_1200x800

The Cyber Cold War: Understanding the Russian cyberattacks, and the strategy to defend against them

The current cyber conflict between Ukraine and Russia is intensifying by the day. As state-sponsored Russian cyberattacks increase, just how big is the risk to business, and how can you defend against it?

IDGConnect_cybersecurity_informationsecurity_shutterstock_2007736076_1200x800

What's the difference between cybersecurity and information security?

While most businesses have robust cybersecurity precautions in place, many often lack a dedicated information security strategy, and are therefore at risk of losing valuable data. Understanding the differences between cybersecurity...

IDGConnect_cybersecurity_employees_security_shutterstock_400653328_1200x800

Cyber 101: Don’t blame it on the staff

More than 90% of cyber-attacks involve a human attack vector. However, despite an emphasis on cyber security training for years, employees still don't consider cyber security to be their responsibility. That doesn't mean we should...

IDGConnect_business_technology_strategy_2022_shutterstock_2036961938_1200x700

Increased regulation, growing threats and prioritising people: What does 2022 have in store?

The past two years have been a whirlwind of events that we never could have predicted. Being forced to work remotely as a result of the COVID-19 pandemic has changed working habits forever. As we come out the other side of the...

IDGConnect_security_cybersecurity_2022_shutterstock_2015613989_1200x800

What will happen to cybersecurity in 2022?

Bernard Montel, EMEA Technical Director and Cybersecurity Strategist at Tenable, shares his predictions for the new year.

IDGConnect_cyberthreat_threat_cyber_security_shutterstock_285058184_1200x800

A look ahead to 2022: predicting the top cyber threats

Looking ahead to 2022, Raj Samani, McAfee Fellow and Chief Scientist at McAfee Enterprise examine the top 2022 cybersecurity threats, including an increase in various types of nation state attacks, as well as a shift in the...

IDGConnect_cyberinsurance_security_ransomware_shutterstock_1886509885_1200x800

Security 2022: Prioritising ransomware & consolidation, and what to do about cyber insurance

As the effects of the pandemic continue and the world of work adjusts to the 'new normal', how will companies approach security in 2022, and how will they see the most value from their increased spend?

IDGConnect_ransomware_UK_cybercrime_2022_ shutterstock_2035174412_1200x800

Ransomware is just the start of the cyber challenge facing UK businesses in 2022

The National Cybersecurity Centre’s (NCSC) latest report of a ‘hacking epidemic’ in the UK is a stark confirmation of what’s been ramping up over the last two years. Ransomware is just the face of a larger cybersecurity challenge the...

Load More