Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.
Read moreListen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks
October 25 2021Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.
Read moreHow We Can Narrow the Talent Shortage in Cybersecurity
October 25 2021Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions.
Read moreCybersecurity Awareness Month: Listen up – CYBERSECURITY FIRST!
October 25 2021Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!
Read moreRansomware Rise Pushes Organizations to Prepare for Attack
October 23 2021Ransomware attacks continue to grow in number and severity, data shows, but organizations are stepping up to prepare for the threat.
Read moreFriday Squid Blogging: Squid Eating Maine Shrimp
October 22 2021Squid are eating Maine shrimp, causing a collapse of the ecosystem. This seems to be a result of climate change.
Maine’s shrimp fishery has been closed for nearly a...
Read more
aDolus raises $2.5 million to secure critical infrastructure and grow sales and marketing team
October 22 2021Software supply chain security experts to drive aggressive go-to-market strategy
Read moreaDolus raises $2.5 million to secure critical infrastructure and grow sales and marketing team
October 22 2021Software supply chain security experts to drive aggressive go-to-market strategy
Read more‘TodayZoo’ Phishing Kit Cobbled Together From Other Malware
October 22 2021Microsoft's analysis of a recent phishing attack shows how cybercriminals are mixing and matching to efficiently develop their attack frameworks.
Read more‘TodayZoo’ Phishing Kit Cobbled Together From Other Malware
October 22 2021Microsoft's analysis of a recent phishing attack shows how cybercriminals are mixing and matching to efficiently develop their attack frameworks.
Read more
Recent Comments