Raising the Stakes – the Evolving Threat of Ransomware
Given the evolving nature of the risks presented by ransomware gangs, there is clearly a need for better protection and remediation strategies.
Read more...The online magazine for cybersecurity and data protection
Given the evolving nature of the risks presented by ransomware gangs, there is clearly a need for better protection and remediation strategies.
Read more...Cybersecurity Awareness Month is coming to an end, and with this year’s focus on the human element of cybersecurity, we collected another round of expert commentaries from the industry.
Read more...The lack of security professionals isn’t because of a lack of affordable training
Read more...Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.
Read more...Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
Read more...If you’re looking to meet requirements and save on cyber insurance premiums, focus on lowering your risk profile. Here’s how.
Read more...Everyone in cybersecurity and quite a few people beyond have probably heard about pentesting. But what is penetration testing really? This article has all the answers.
Read more...Our first magazine is out – and we thought, we’d tease the content by publishing this article from our friends at BLST Security. This article gives an insight into different tools you can use for securing your APIs.
Read more...The world of cybersecurity was a mess prior to the pandemic. Now it is a textbook catastrophe that we are only now figuring out how
Read more...Few small and medium sized businesses know how to protect themselves against cyber attacks. Penetration Tests are a good practice to start with, says our editor Lou Covey.
Read more...