Does it matter if your company is hacked?

Does it matter if your company is hacked?

And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they considered their network to be secure, hacked or in some other state. The ex-military team manager was supremely ... Read More
DIY email security

DIY email security

Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? Or could you create your own secure email server and get top grade protection for free? Compare a ... Read More
Top Five Antivirus Myths Busted

Top five antivirus myths busted

And why do we still believe them? Anti-virus, or endpoint security plays an essential part in protecting Windows PCs. Whether you are working in the world’s largest enterprise, or using a small personal laptop, you need a last line of defence against attacks that use malicious code to steal or ... Read More
Early protection systems

Early protection systems

Can EDR really stop advanced targeted attacks? SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks. Full attack chain EDR test There are many opportunities ... Read More
Schools cybersecurity training

Schools cybersecurity training

SE Labs runs second cybersecurity education programme for schools About Level:Up SE Labs is running its Level:Up security education programme for the second year in a row, partnering with local schools to provide a thorough cybersecurity overview specifically created for key stage 4 and key stage 5 students. The programme ... Read More
🥇

Cyber Security DE:CODED – Full attack chain testing

“Because we test realistically, sometimes bad guys come onto our test network and mess with us” Show notes for series 2, episode 9 (final episode of series 2) What is the attack chain? Why is it good to test using full attack chains? And what are some of the alternative ... Read More
Ransomware Detection Using Hardware

Ransomware Detection Using Hardware

Computer processors get the final word when running programs. Can they judge bad code from good? Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection. All malware has to run on a target to achieve its goal. Whether it’s a remote access Trojan, a ... Read More
🥇

Cyber Security DE:CODED – Cheating in security testing

“If they chose the best products by rolling a dice then they should say so” Show notes for series 2, episode 8 If we’ve given the impression that we’re at the heart of the security world, working with the organisations that spend billions on security – and with the companies ... Read More
Choose your reviews carefully

Choose your reviews carefully

Three reasons our security tests are the most trustworthy This security report compares anti-malware products. Its job is to help you make informed buying decisions. We applied advanced testing techniques to ensure that the results are meaningful. The same cannot be said for many other tests. I’d say you’ve picked ... Read More
🥇

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…” Show notes for series 2, episode 7 Small business and Managed Service Provider special! In June 2022*, we set up a panel of security experts to help and advise companies selling managed security services. Managed Service Providers ... Read More
Loading...