Security

Security | News, how-tos, features, reviews, and videos

A businessman reaching out to touch a user type login, and password
Businessman on mobile phone logging in to secure account

IDGConnect_UK_businesses_cyber_threats_shutterstock_1978834034_1200x800

UK businesses struggle with cyber threats

The 3 key threats that UK businesses should watch out for are geopolitical hacking, vulnerable developer environments, and machine identity outages. Each of these pose unique problems to business leaders that, if left unattended, can...

A criminal lock on a cloud that’s stuck behind chains with a red binary background

Hacking the cloud: why APIs are now a top threat

The Application Programming Interface (API) is now integral to many services but it’s also a key target for attackers. Jason Kent, Hacker in Residence at Cequence Security, looks at why insecure APIs are now topping threat charts.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

Illustration of different endpoints with a security shield in the centre, concept of secure access

Secure Access Service Edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

People having a meeting in executive conference room with cityscape as the background

How to communicate risk to the board: the ‘Goldilocks’ approach

Boards care about risk – while boards are getting more IT-savvy members to cope with the challenges and changes that are taking place around their businesses, they really care about risk. Boards and executives are now approaching...

Cyber security illustration. Lock icon. Digital information and database protection

Database Security: Which solution is best?

Peerspot users review the highest reviewed solutions in the database security market.

Multiple endpoints with a security symbol in the middle

Endpoint Detection and Response (EDR): Which solution is best?

Peerspot users review the highest reviewed solutions in the endpoint detection and response (EDR) market.

IDGConnect_CISO_security_career_future_role_shutterstock_1798108945_1200x800

The CISO of tomorrow

It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could be about to change. Jamal Elmellas, COO at...

IDGConnect_worlds_worst_passwords_shutterstock_1819491845_1200x800

What are the world’s worst passwords?

World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.

IDGConnect_cyber_prevention_mitigation_security_shutterstock_2005877624_1200x800

Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?

IDGConnect_peerspot_security_automation_SOAR_shutterstock_1931787956_1200x700

Security orchestration, automation and response (SOAR): Which solution is best?

Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.

IDGConnect_leader_security_acumen_knowledge_shutterstock_626191811_1200x800

Is business acumen now more vital for a CISO than security knowledge?

The days when security was only important to financial services and defence organisations are long gone, and with hefty fines and reputational damage having a devastating impact on businesses – board members are starting to take note...

IDGConnect_data_privacy_2022_compliance_shutterstock_1100627288_1200x800

Data privacy in 2022 – are you still compliant?

Legal compliance and digital trust are the two main issues pushing investment into privacy in 2022, as organisations wrangle with a growing number of privacy regulations and customer demand for improved transparency.

IDGConnect_peerspot_SASE_secureaccessserviceedge_shutterstock_2141637945_1200x700

Secure access service edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

IDGConnect_dataprotection_sovereigncloud_regulation_shutterstock_2068468778_1200x800

Sovereign cloud: Protecting data in a complex regulatory environment

As the data economy flourishes, organisations must keep up with laws and regulations impacting data sovereignty and ensure they stay in compliance. Neil Stobart, VP of Global System Engineering for Cloudian looks at the five main data...

IDGConnect_enterprise_infrastructure_vpn_peerspot_shutterstock_1149426011_1200x750

Enterprise infrastructure VPN: Which solution is best?

Peerspot users review the highest reviewed solutions in the enterprise infrastructure VPN market.

IDGConnect_africa_data_marketplace_shutterstock_1549204124_1200x800

Why the data marketplace model could help businesses in Africa

A decentralised data sharing platform can transform businesses, especially those in credit and payments.

Load More