Security | News, how-tos, features, reviews, and videos

A businessman reaching out to touch a user type login, and password
Businessman on mobile phone logging in to secure account


UK businesses struggle with cyber threats

The 3 key threats that UK businesses should watch out for are geopolitical hacking, vulnerable developer environments, and machine identity outages. Each of these pose unique problems to business leaders that, if left unattended, can...

A criminal lock on a cloud that’s stuck behind chains with a red binary background

Hacking the cloud: why APIs are now a top threat

The Application Programming Interface (API) is now integral to many services but it’s also a key target for attackers. Jason Kent, Hacker in Residence at Cequence Security, looks at why insecure APIs are now topping threat charts.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

Illustration of different endpoints with a security shield in the centre, concept of secure access

Secure Access Service Edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

People having a meeting in executive conference room with cityscape as the background

How to communicate risk to the board: the ‘Goldilocks’ approach

Boards care about risk – while boards are getting more IT-savvy members to cope with the challenges and changes that are taking place around their businesses, they really care about risk. Boards and executives are now approaching...

Cyber security illustration. Lock icon. Digital information and database protection

Database Security: Which solution is best?

Peerspot users review the highest reviewed solutions in the database security market.

Multiple endpoints with a security symbol in the middle

Endpoint Detection and Response (EDR): Which solution is best?

Peerspot users review the highest reviewed solutions in the endpoint detection and response (EDR) market.


The CISO of tomorrow

It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could be about to change. Jamal Elmellas, COO at...


What are the world’s worst passwords?

World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.


Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?


Security orchestration, automation and response (SOAR): Which solution is best?

Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.


Is business acumen now more vital for a CISO than security knowledge?

The days when security was only important to financial services and defence organisations are long gone, and with hefty fines and reputational damage having a devastating impact on businesses – board members are starting to take note...


Data privacy in 2022 – are you still compliant?

Legal compliance and digital trust are the two main issues pushing investment into privacy in 2022, as organisations wrangle with a growing number of privacy regulations and customer demand for improved transparency.


Secure access service edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.


Sovereign cloud: Protecting data in a complex regulatory environment

As the data economy flourishes, organisations must keep up with laws and regulations impacting data sovereignty and ensure they stay in compliance. Neil Stobart, VP of Global System Engineering for Cloudian looks at the five main data...


Enterprise infrastructure VPN: Which solution is best?

Peerspot users review the highest reviewed solutions in the enterprise infrastructure VPN market.


Why the data marketplace model could help businesses in Africa

A decentralised data sharing platform can transform businesses, especially those in credit and payments.

Load More