Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


188 articles by Phil Muncaster

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs.

Phil Muncaster04 Dec 20254 min. read


Oversharing is not caring: What’s at stake if your employees post too much online

Oversharing is not caring: What’s at stake if your employees post too much online

Oversharing is not caring: What’s at stake if your employees post too much online

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.

Phil Muncaster01 Dec 20255 min. read


What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.

Phil Muncaster27 Nov 20255 min. read


Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.

Phil Muncaster25 Nov 20254 min. read


What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.

Phil Muncaster17 Nov 20254 min. read


How password managers can be hacked – and how to stay safe

How password managers can be hacked – and how to stay safe

How password managers can be hacked – and how to stay safe

Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe

Phil Muncaster13 Nov 20255 min. read


Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company

Phil Muncaster11 Nov 20255 min. read


Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster

Phil Muncaster03 Nov 20255 min. read


Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Phil Muncaster28 Oct 20255 min. read