Pentesting is the first step in the Holy Grail of security
Few small and medium sized businesses know how to protect themselves against cyber attacks. Penetration Tests are a good practice to start with, says our editor Lou Covey.
Read more...Few small and medium sized businesses know how to protect themselves against cyber attacks. Penetration Tests are a good practice to start with, says our editor Lou Covey.
Read more...Many organisations are unclear about what levels of data protection are provided by cloud infrastructure, increasing the risk of data loss and compliance breach. Adopting 3rd party data protection tools ensures data protection, says Gijsbert Janssen van Doorn, Director Technical Marketing at Zerto.
Read more...Join our US-Editor Lou Covey at the Secure and Private Compute Summit on July 6-8 where he’ll be moderating the panel: Introducing the Confidential Public Cloud – Closing the Final Security Gap in the Data Lifecycle. The SPC Summit is a free conference covering how to keep data secure throughout the data lifecycle. Register for free here: https://hubs.ly/H0M6_ks0
Read more...For a journalist to decide what to cover and when takes some discussion and this week we decided to do our editorial meeting in a public setting so you can see how we pick what to report.
Read more...Did you know that World Productivity Day happened last Sunday? It’s a bit counterintuitive to host a productivity day on the least productive day of the week, but productivity changed a lot during the crisis, with impacts to cybersecurity as well. We spoke with industry experts about it.
Read more...When data of more than 500 million Facebook users surfaced earlier this year, no security breach was to blame. Those data were extracted using “web scraping” – but what is this and do we really want to do something about it?
Read more...The need for skilled workers in the cybersecurity industry is and has been at a critical level for a decade. And it isn’t going away anytime soon.
Read more...We have already ventured into recording videos in the past, and our YouTube channel shows that this is being recognized.…
Read more...Open-source software is widely used to speed up the development of software products. However, open source software is not free from security weaknesses. How can companies secure their final products nevertheless?
Read more...Blockchain and its best known application, the Bitcoin crypto currency, are seen as very secure. But is this really true? We spoke with Prof. Aggelos Kiayias, Chief Scientist at blockchain technology company IOHK, about the security and future of blockchain.
Read more...