Business security


277 articles

Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

How robust backup practices can help drive resilience and improve cyber-hygiene in your company

Phil Muncaster18 Oct 2023


Business Security

6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

Business Security

6 steps to getting the board on board with your cybersecurity program

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

Phil Muncaster11 Oct 2023


Secure Coding, Business Security

Can open-source software be secure?

Can open-source software be secure?

Secure Coding, Business Security

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


Business Security

Staying ahead of threats: 5 cybercrime trends to watch

Staying ahead of threats: 5 cybercrime trends to watch

Business Security

Staying ahead of threats: 5 cybercrime trends to watch

New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought

Phil Muncaster06 Sep 2023


Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software

Roman Cuprik28 Aug 2023


Critical Infrastructure, Cybercrime

Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Critical Infrastructure, Cybercrime

Black Hat 2023: Hacking the police (at least their radios)

Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.

Cameron Camp15 Aug 2023


Digital Security, Ransomware, Cybercrime

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Digital Security, Ransomware, Cybercrime

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks

Tony Anscombe12 Aug 2023


Critical Infrastructure, Malware

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Critical Infrastructure, Malware

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 2023


Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor02 Aug 2023