Business security


392 articles

Protecting education: How MDR can tip the balance in favor of schools

Protecting education: How MDR can tip the balance in favor of schools

Protecting education: How MDR can tip the balance in favor of schools

The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?

Phil Muncaster04 Mar 2026


Naming and shaming: How ransomware groups tighten the screws on victims

Naming and shaming: How ransomware groups tighten the screws on victims

Naming and shaming: How ransomware groups tighten the screws on victims

When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle

Guilherme Arruda12 Feb 2026


Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Tony Anscombe12 Dec 2025


Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims

Tony Anscombe11 Dec 2025


Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

If you don’t look inside your environment, you can’t know its true state – and attackers count on that

Steven Connolly11 Dec 2025


Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

Phil Muncaster09 Dec 2025


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs.

Phil Muncaster04 Dec 2025


MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

Why your business needs the best-of-breed combination of technology and human expertise

Steven Connolly24 Nov 2025