Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


198 articles by Phil Muncaster

Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Phil Muncaster28 Oct 20255 min. read


How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs

Phil Muncaster27 Oct 20255 min. read


IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.

Phil Muncaster15 Oct 20255 min. read


AI-aided malvertising: Exploiting a chatbot to spread scams

AI-aided malvertising: Exploiting a chatbot to spread scams

AI-aided malvertising: Exploiting a chatbot to spread scams

Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.

Phil Muncaster13 Oct 20255 min. read


The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center

Phil Muncaster07 Oct 20255 min. read


Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging

Phil Muncaster03 Oct 20255 min. read


Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises

Phil Muncaster18 Sep 20255 min. read


Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight

Phil Muncaster11 Sep 20255 min. read


Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy

Phil Muncaster09 Sep 20254 min. read