Security

Security | News, how-tos, features, reviews, and videos

Businessman walking on twisted rope high in sky

Removing security complexity to combat cyber threats

Businesses are struggling with an overwhelming, and increasingly complex and confusing cyber world. Ian McShane, Field CTO at Arctic Wolf looks at how cyber simplicity is the key for businesses to move forward with their security...

Endpoint Security Solutions Concept with Virtual Shield and Laptop Connected to the Digital Cloud

Endpoint Encryption: Which solution is best?

Peerspot users review the highest rated solutions in the endpoint encryption market.

Businessman using mobile smart phone and security shielding icon.

Application Security Tools: Which solution is best?

Peerspot users review the highest reviewed solutions in the application security tool market

A businessman reaching out to touch a user type login, and password

Auth0 vs Azure Active Directory (Azure AD): Which Single Sign-On (SSO) solution is better?

Peerspot users evaluate two of the highest reviewed solutions in the Single Sign-On (SSO) market – Auth0 and Azure Active Directory (Azure AD).

Businessman on mobile phone logging in to secure account

Single Sign-On (SSO): Which solution is best?

Peerspot users review the highest reviewed solutions in the single sign-on market.

IDGConnect_UK_businesses_cyber_threats_shutterstock_1978834034_1200x800

UK businesses struggle with cyber threats

The 3 key threats that UK businesses should watch out for are geopolitical hacking, vulnerable developer environments, and machine identity outages. Each of these pose unique problems to business leaders that, if left unattended, can...

A criminal lock on a cloud that’s stuck behind chains with a red binary background

Hacking the cloud: why APIs are now a top threat

The Application Programming Interface (API) is now integral to many services but it’s also a key target for attackers. Jason Kent, Hacker in Residence at Cequence Security, looks at why insecure APIs are now topping threat charts.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

Illustration of different endpoints with a security shield in the centre, concept of secure access

Secure Access Service Edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

People having a meeting in executive conference room with cityscape as the background

How to communicate risk to the board: the ‘Goldilocks’ approach

Boards care about risk – while boards are getting more IT-savvy members to cope with the challenges and changes that are taking place around their businesses, they really care about risk. Boards and executives are now approaching...

Cyber security illustration. Lock icon. Digital information and database protection

Database Security: Which solution is best?

Peerspot users review the highest reviewed solutions in the database security market.

Multiple endpoints with a security symbol in the middle

Endpoint Detection and Response (EDR): Which solution is best?

Peerspot users review the highest reviewed solutions in the endpoint detection and response (EDR) market.

IDGConnect_CISO_security_career_future_role_shutterstock_1798108945_1200x800

The CISO of tomorrow

It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could be about to change. Jamal Elmellas, COO at...

IDGConnect_worlds_worst_passwords_shutterstock_1819491845_1200x800

What are the world’s worst passwords?

World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.

IDGConnect_cyber_prevention_mitigation_security_shutterstock_2005877624_1200x800

Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?

IDGConnect_peerspot_security_automation_SOAR_shutterstock_1931787956_1200x700

Security orchestration, automation and response (SOAR): Which solution is best?

Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.

IDGConnect_leader_security_acumen_knowledge_shutterstock_626191811_1200x800

Is business acumen now more vital for a CISO than security knowledge?

The days when security was only important to financial services and defence organisations are long gone, and with hefty fines and reputational damage having a devastating impact on businesses – board members are starting to take note...

IDGConnect_data_privacy_2022_compliance_shutterstock_1100627288_1200x800

Data privacy in 2022 – are you still compliant?

Legal compliance and digital trust are the two main issues pushing investment into privacy in 2022, as organisations wrangle with a growing number of privacy regulations and customer demand for improved transparency.

IDGConnect_peerspot_SASE_secureaccessserviceedge_shutterstock_2141637945_1200x700

Secure access service edge (SASE): Which solution is best?

Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.

Load More