Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.
GoldenJackal attacks prove that air-gapped security still isn’t enough
We reveal the method behind the GoldenJackal attacks, who's being targeted, and why air-gapped defences aren't enough
DrayTek users told to patch routers as 15 security vulnerabilities confirmed
America's Cyber Defense Agency warns of one crucial vulnerability for DrayTek routers while a second report reveals 14 more vulnerabilities
Zero Trust must be enforced at the application and workload layer
Ev Kontsevoy, CEO at Teleport, makes the case for enforcing Zero Trust at the application and workload layer, not just the network level.
Ransomware August 2024 round-up: fools, rules and tools
The latest security reports, from August 2024, show that ransomware continues to be the biggest threat to businesses in the EU and USA
Should you install an antivirus on your Mac?
Not only will it protect your device, but it will also ensure that no existing malware infections will spread.
Revealed: the most dangerous words in spam email
Email validation specialist ZeroBounce has discovered the words that recur the most, as well as pose the most danger, in scam mails.
Crushing the $318 billion piracy menace: time to act before it’s too late
The digital piracy threat looms large - to combat it, disrupting pirate payment methods and boosting global enforcement is crucial.
Fully Homomorphic Encryption (FHE) explained
From Caesar’s cypher to Fully Homomorphic Encryption (FHE) - Jeremy Bradley, COO, Zama, explains, in this sponsored article, exactly what FHE is, how it has evolved, what it is now capable of and how far off truly universalised FHE is.
Hackers beware: UK data centres now have critical national infrastructure protection (CNI)
UK government beefs up national security by adding CNI status to its data centres - here's why it should help
Balancing innovation and regulation – fighting financial crime in the fintech era
In fintech, innovation comes with a great responsibility to safeguard customers from money laundering, fraud, and financial crime.
Ransomware tactics 2024: why you need to protect yourself differently
New ransomware reports show how the gangs are shifting their methods. Here's how you need to fight back against ransomware tactics in 2024
Chris Harris, EMEA Technical Director, Data Security at Thales: “Deepfake technology has escalated fraud to new heights”
We interview Chris Harris, EMEA Technical Director, Data Security at Thales, a leader with over 25 years' experience in IT security
Detecting DDoS attacks: how to tell a real attack from fake news using AI and common sense
Dubious claims about downtime make it difficult to separate fake news from legitimate outages: here's out to detect genuine DDoS attacks, writes Donny Chong
Don’t call it quishing but, please, do take it seriously
Is that a genuine QR code you see before you? Better make sure, or you'll be the latest victim of a quishing attack
Navigating cybersecurity challenges in advanced manufacturing
Integrating new advanced technologies is one of the biggest cybersecurity challenges the manufacturing is facing - here's why.
Optus partners with Devo to launch 24/7 threat-monitoring service
Optus has partnered with US-based security data analytics firm Devo Technology to launch a 24/7 automated managed threat monitoring service for enterprise and mid-market customers.
Trump may not have been silenced by DDoS attacks, but your business could be
While DDoS attacks didn't affect X, they're hurting businesses in the real world - protect yourself now or you could be the next victim
IBM introduces generative AI cybersecurity assistant to speed up responses
IBM has bolstered its managed threat detection and response services with a new generative AI-powered cybersecurity assistant.
Windows Downdate attack exploits Windows Update to ‘unpatch’ secure devices
Thought your Windows PC was secure because it was fully updated? As Davey Winder reveals, the Windows Downdate attack means you must think again.
KYB: Why accurate business verification matters for fintechs
One of the most effective ways for fintechs to counter threats is by employing robust KYB (Know Your Business) checks. Here, we explore why.