Web apps and security weaknesses
Web applications are now at the heart of systems across both the private and public sectors. And a plethora of systems now work via web interfaces and API calls. Some estimates suggest any one enterprise […]
Web applications are now at the heart of systems across both the private and public sectors. And a plethora of systems now work via web interfaces and API calls. Some estimates suggest any one enterprise […]
Balancing the need for privacy, and the demands of business for ever more data, is never easy. Data, including personal data, is essential for innovation, productivity, and better public services. At the same tine individuals […]
When IT director Tony Mendoza discovered his company under attack by a ransomware group, there was no playbook for how to respond. He and his team had to react — at speed — to a […]
Is cyber the new war zone? NATO has declared cyber as one of the domains of warfare. The UK is standing up a National Cyber Force. And both friendly and hostile nations are bolstering their […]
It’s no longer a question of if you will be hacked. It’s when. This makes rigorous security testing all the more important. And Red Team exercises, testing the organisation against an adversary in real time, […]
Last autumn, Security Insights produced a four-part series on the pandemic, and the challenge it poses to cyber security. We’ve put links to all the episodes here, plus our interview with Amar Singh, from the […]
Most cybercrime goes unreported by enterprises, according to ISACA. We ask their researchers why. […]
Copyright © 2024 | MH Magazine WordPress Theme by MH Themes