NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines
NanoLock has announced the launch of a new suite of zero-trust cybersecurity solutions for the industrial and manufacturing market. In a press release, the firm...
Open-source standard aims to unify incompatible cloud identity systems
A new open-source project aims to unify incompatible cloud identity systems such as Azure, AWS and Google, giving users the ability to apply consistent identity...
iPhone Malware that Operates Even When the Phone Is Turned Off
Researchers have demonstrated iPhone malware that works even when the phone is fully shut down. t turns out that the iPhone’s Bluetooth chip — which...
UK Government: Lack of Skills the Number One Issue in Cybersecurity
Andrew Elliot from DCMS provides an update on government initiatives to boost cybersecurity talent pipeline Read More
Building trust in a Zero-Trust security environment
This blog was written by an independent guest blogger. Despite years of industry efforts to combat insider threats, malicious behavior can still sometimes be difficult...
Digital Skimming is Now the Preserve of Non-Magecart Groups
Commodity kit invites new entrants into the market Read More
Western Allies Warn of Top Cyber-Attack Mistakes
Poor cyber-hygiene to blame for many compromises Read More
What Microsoft Defender can tell you about your network
Endpoint detection and response (EDR) is typically not something that smaller firms have. Defender for Business makes it easier to deploy EDR in a reasonable...
Top Linux endpoint protection software
I've been running the Linux desktop since the great desktop debate was between C Shell and Bash. I've never felt a need for a Linux...
Police Warn of £15m Courier Scams
Blend of phone and face-to-face fraud targets vulnerable Read More