Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


137 articles by Phil Muncaster

Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

Beyond the pandemic: Why are data breach costs at an all-time high?

Less Technical

Beyond the pandemic: Why are data breach costs at an all-time high?

It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.

Phil Muncaster27 Aug 20214 min. read


COVID-19

Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

COVID-19

Examining threats to device security in the hybrid workplace

As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands

Phil Muncaster12 Aug 20214 min. read


COVID-19

Why cloud security is the key to unlocking value from hybrid working

Why cloud security is the key to unlocking value from hybrid working

COVID-19

Why cloud security is the key to unlocking value from hybrid working

How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?

Phil Muncaster05 Aug 20215 min. read


COVID-19

Tackling the insider threat to the new hybrid workplace

Tackling the insider threat to the new hybrid workplace

COVID-19

Tackling the insider threat to the new hybrid workplace

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose

Phil Muncaster29 Jul 20214 min. read


COVID-19

Protecting the hybrid workplace through Zero Trust security

Protecting the hybrid workplace through Zero Trust security

COVID-19

Protecting the hybrid workplace through Zero Trust security

The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.

Phil Muncaster23 Jul 20215 min. read


Critical Infrastructure

Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Critical Infrastructure

Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Lessons to learn from the Kaseya cyberincident to protect your business' data when doing business with a MSP.

Phil Muncaster13 Jul 20214 min. read


COVID-19

The hybrid workplace: What does it mean for cybersecurity?

The hybrid workplace: What does it mean for cybersecurity?

COVID-19

The hybrid workplace: What does it mean for cybersecurity?

How can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers?

Phil Muncaster13 Jul 20215 min. read


Business Security

State-sponsored or financially motivated: Is there any difference anymore?

State-sponsored or financially motivated: Is there any difference anymore?

Business Security

State-sponsored or financially motivated: Is there any difference anymore?

What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?

Phil Muncaster21 Jun 20214 min. read


Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT 101: What is open source intelligence and how is it used?

Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers

Phil Muncaster16 Jun 20214 min. read