Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


127 articles by Phil Muncaster

Scams

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

Scams

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Phil Muncaster27 Nov 20235 min. read


Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 20234 min. read


Business Security

Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Business Security

Navigating the security and privacy challenges of large language models

Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technology’s business value

Phil Muncaster06 Nov 20235 min. read


Digital Security

20 scary cybersecurity facts and figures for a haunting Halloween

20 scary cybersecurity facts and figures for a haunting Halloween

Digital Security

20 scary cybersecurity facts and figures for a haunting Halloween

Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online

Phil Muncaster30 Oct 20234 min. read


Business Security

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Business Security

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats

Phil Muncaster19 Oct 20235 min. read


Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

How robust backup practices can help drive resilience and improve cyber-hygiene in your company

Phil Muncaster18 Oct 20235 min. read


Business Security

6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

Business Security

6 steps to getting the board on board with your cybersecurity program

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

Phil Muncaster11 Oct 20234 min. read


Social Media

Fake friends and followers on social media – and how to spot them

Fake friends and followers on social media – and how to spot them

Social Media

Fake friends and followers on social media – and how to spot them

One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.

Phil Muncaster06 Oct 20235 min. read


We Live Progress

Playing your part in building a safer digital world: Why cybersecurity matters

Playing your part in building a safer digital world: Why cybersecurity matters

We Live Progress

Playing your part in building a safer digital world: Why cybersecurity matters

In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being

Phil Muncaster03 Oct 20235 min. read