Business security


303 articles

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Márk Szabó28 Feb 2024


Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

A mix of PSYOPs, espionage and … fake Canadian pharmacies!

Matthieu Faou21 Feb 2024


Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

Editor09 Feb 2024


The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 2024


Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Tomáš Foltýn06 Feb 2024


Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

Andy Garth29 Jan 2024


Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 2024


The 7 deadly cloud security sins – and how SMBs can do things better

The 7 deadly cloud security sins – and how SMBs can do things better

The 7 deadly cloud security sins – and how SMBs can do things better

By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk

Phil Muncaster16 Jan 2024


A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks

Tomáš Foltýn11 Jan 2024