Data Security
Dan Draper, CEO at CipherStash: “If it’s not a hell yes, it’s probably a no!”
In this interview, we speak to Dan Draper, Founder and CEO at CipherStash, a cybersecurity platform focused on data security and encryption technology.
What is an Advanced Persistent Threat (APT)?
As security expert Davey Winder explains, all sizes of business – and every individual who works for them – can be a target of an APT attack. Even if the end goal is a much bigger fish.
How ransomware attacks work
One of the UK's leading security experts reveals how attackers break in to business networks and extort ransoms from their victims. And you can't breathe easy afterwards, as they will likely attack again.
LastPass Hack: Developer Was Targeted At Home
Company reveals that one engineer - one of four with access to decryption keys - was targeted as part of last summer's attack on the password manager.
Journalist Breaks Bank Security With AI Voice
Bank security called into question after journalist bypasses voice ID system with AI replica
Are ransomware gangs getting too greedy?
As the Royal Mail refuses to pay criminals to unlock its data, we investigate whether greed is getting the better of ransomware groups.
What is ransomware?
Ransomware attacks are big business but affect businesses of all sizes. Here, we explain how it works and how to best defend against it.
What is confidential computing?
Attackers target data when it’s at rest and in transit, but they also really want data being processed. Confidential computing is your guard.
Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…
Guards vs Firewalls: Ensuring Secure Data Transfer
Learn when software guard technology may be a better solution than available firewall technologies. Government and commercial entities are constantly on alert to prevent and…
7 Best Practices for Data Security in Office 365 and Beyond
Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments.…