Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2024

What is UPnP? And Why is it Still a Security Risk?

In this video, learn what UPnP is, what it does, use cases, why it's a security risk, and security measures you can take. Learn more about: Resources and social media: Transcript: Universal Plug and Play, or UPnP, is a way for all devices on a local network to discover and connect with each other automatically, rather than having to connect each device by manually entering protocols like TCP/IP, HTTP, or DHCP.

What Are Hardware and Software Keyloggers? How Can You Spot and Prevent Them?

In this video, learn what hardware and software keyloggers are, signs you may have one, how to prevent them, and more. Learn more about: Resources and social media: Transcript: Do you remember every key you pressed on your laptop today? Every word you typed in an email? Every password you punched in? Every digit you entered for your credit card? For you and me, recalling all that information is next to impossible. But not for a Keylogger.
Featured Post

Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?

Artificial Intelligence (AI) is perhaps one of the fastest evolving technologies in business today. For SMEs, it can be hard to keep up with these developments and sift through what's simply noise, and what will deliver tangible business benefits. As the UK data from our recent SME IT Trends report shows, embracing AI can help UK SMEs streamline operations, improve the admin and user experience, and stand out in a crowded marketplace. Without a doubt, choosing to ignore AI would be choosing to fall behind.

What Is ARM64 and Why Should You Use It?

In this video, learn what ARM64 is, its architecture, its advantages over x86 and other processors, and other general benefits. Resources and social media: Transcript: If you’re wondering what ARM64 is, let’s flash back a few years… During the 2000s, ARM processors led the way in the mobile revolution, providing our smartphones and tablets with serious computing power. ARM’s 32-bit chips were built on reduced instruction set computer (RISC) architecture that clocked speeds of 1 to 2 GHz, and became the dominant chip inside the devices we put in our pockets.