encryption software
Latest about encryption software

We’re spending too much on cybersecurity
By Tony Buffomante published
Tony Buffomante at Wipro discusses how more organizations are opting for macro platforms to protect themselves from cyber criminals.

How to organize the chaos of ransomware recovery
By Scott McKinnon published
Getting in formation efficiently, both online and offline, saves precious minutes during detection and response.

Navigating new threats, underwhelming tech and board discussions
By Fabien Rech published
1 in 4 UK CISOs feel overwhelmed when they manage a cybersecurity incident and are left feeling like a ‘one man band’.

Securing critical infrastructure is crucial for businesses
By Vishal Salvi published
Attacks on critical infrastructure or critical national infrastructure, often referred as CNI need special attention as it can have wide-spread impact on communities and nations.

Through the eyes of an adversary: moving beyond the external attack surface
By Mark Watkinson published
Mark Watkinson at Adarma asks: Would you know the blast radius of ransomware in your network?

Zero trust for SMBs: Start thinking incrementally
By Mark Lee published
Mark Lee, CEO of Splashtop asks what can SMBs do to adopt a Zero Trust security posture.

How increased connectivity could compromise energy suppliers
By Tony Burton published
Exploring the potential for hackers to capitalize on increased connectivity and bring down the smart-grid.

Data security and the mitigation of threat as remote working evolves
By John Michael published
iStorage CEO, John Michael, considers the ways in which hybrid working is set to change, and the steps organizations must take to ensure their data remains safe.
Sign up for breaking news, reviews, opinion, top tech deals, and more.