Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


123 articles by Phil Muncaster

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 20215 min. read


Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

Employee offboarding: Why companies must close a crucial gap in their security strategy

Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?

Phil Muncaster14 Oct 20214 min. read


Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 20214 min. read


Digital Security

What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

Digital Security

What is an attack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.

Phil Muncaster14 Sep 20214 min. read


Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

Beyond the pandemic: Why are data breach costs at an all-time high?

Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.

Phil Muncaster27 Aug 20214 min. read


COVID-19

Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

COVID-19

Examining threats to device security in the hybrid workplace

As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands

Phil Muncaster12 Aug 20214 min. read


COVID-19

Why cloud security is the key to unlocking value from hybrid working

Why cloud security is the key to unlocking value from hybrid working

COVID-19

Why cloud security is the key to unlocking value from hybrid working

How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?

Phil Muncaster05 Aug 20215 min. read


COVID-19

Tackling the insider threat to the new hybrid workplace

Tackling the insider threat to the new hybrid workplace

COVID-19

Tackling the insider threat to the new hybrid workplace

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose

Phil Muncaster29 Jul 20214 min. read


COVID-19

Protecting the hybrid workplace through Zero Trust security

Protecting the hybrid workplace through Zero Trust security

COVID-19

Protecting the hybrid workplace through Zero Trust security

The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.

Phil Muncaster23 Jul 20215 min. read