Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Protect Yourself From AI Voice Scam Calls

Artificial Intelligence (AI) being used to carry out cybercrime isn’t new, but as AI becomes more advanced, so do the tools that cybercriminals are using. One of the most recent AI-enabled cyber threats we’ve seen is cybercriminals using voice-cloning technology to carry out scam calls. You can protect yourself from AI voice-cloning scam calls by blocking spam calls, not picking up calls from unknown numbers and creating a safe word with your family in case a legitimate emergency occurs.

The C-suite conundrum: Are senior executives the Achilles' heel of cybersecurity?

In today's digital landscape, an organization’s C-suite and senior executives hold the most valuable corporate data and sign-off authorities, meaning they represent the highest potential risk over email. Whether it’s inbound spear phishing attacks, or outbound mistakes resulting in a damaging data breach, the C-suite are vulnerable.

Navigating the Maze: Overcoming Security Issues in IoT

Security issues in IoT are a pressing concern as the number of connected devices skyrockets. What vulnerabilities are these devices exposed to, and what can be done to secure them against escalating cyber threats? This article provides a no-nonsense overview of the inherent risks in the IoT landscape and the steps necessary to maintain the integrity and safety of IoT ecosystems.

World Backup Day and the Importance of Being Prepared

It’s been nearly 365 days since the last World Backup Day, and we’ve got a lot to discuss. Let’s see, I completed my annual rewatch of The Sopranos. I took a deep dive into the SEC’s new cybersecurity rules and the nature of “materiality.” My wife and I finally agreed on a new sectional for the living room. What else … OH YEAH AND WE HAD A KID. Like I said, it’s been quite the year.

Creating Actionable Threat Intelligence for Threat Hunters

Ask any security leader and they’ll tell you actionable threat intelligence is the cornerstone of a successful, threat-informed security operations center (SOC). However, to be of any real value to the team, threat intelligence needs to be relevant, timely, and supportive of next steps for the teams that utilize it.

Top tips: Three hacks to safeguard your privacy online

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at three hacks to secure your online privacy. In today’s world, we exist online as much as offline. There’s few mysteries left in our lives. Most information you need about a person is a few clicks away.

Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something timeless about the art of storytelling. That’s the spirit behind Endpoint Pulse, your one-stop podcast for all things endpoint management and security. We embarked on this journey in October 2023, and after months of hard work, we released our first episode in January 2024.
Featured Post

SMEs Invest in Tech Opportunities but Risk Missing Security Safeguards

Across Europe, 100 million people are employed by small and medium-sized enterprises (SMEs). The UK has over five million SMEs, providing three-fifths of employment and £2.4 trillion in turnover. As a vital component in the national economy, SMEs must continue to invest in automation, technology-led innovation, and underpin this with strong security.

Employee Clock-In Systems: Balancing Efficiency and Employee Satisfaction

How can businesses ensure that their employee clock in system maximize productivity without compromising employee satisfaction? This delicate balance often poses a significant challenge for many organizations. By ensuring the right blend of efficiency and satisfaction, companies can not only boost their operational success but also foster a positive work environment. As we proceed, we'll explore various strategies to achieve this balance, leaving you equipped to make well-informed decisions regarding your own company's clock-in system.

Code Review Practices: Cultivating a Culture of Clean Code within Development Teams

Every day, development teams rely on reviews to ensure high-quality code, encourage knowledge sharing, and strengthen professional relationships. By including the whole team in driving the growth of the base and enforcing its standards, they provide developers with the certainty that their contributions achieve the highest standards. On top of that, they head off technical debt and bring attention to chances for praise and positive reinforcement.