Business security


304 articles

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats

Phil Muncaster19 Oct 2023


Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

How robust backup practices can help drive resilience and improve cyber-hygiene in your company

Phil Muncaster18 Oct 2023


6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

Phil Muncaster11 Oct 2023


Can open-source software be secure?

Can open-source software be secure?

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


Staying ahead of threats: 5 cybercrime trends to watch

Staying ahead of threats: 5 cybercrime trends to watch

Staying ahead of threats: 5 cybercrime trends to watch

New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought

Phil Muncaster06 Sep 2023


Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software

Roman Cuprik28 Aug 2023


Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.

Cameron Camp15 Aug 2023


Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks

Tony Anscombe12 Aug 2023


Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 2023