enterprise
Does it matter if your company is hacked?
And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they ...
SUSE Survey Surfaces Multiple Cloud Security Challenges
A survey of 501 IT professionals based in the U.S., United Kingdom and Germany published today found that, on average, organizations were impacted by four cloud-related security incidents in the past year ...
DIY email security
Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? ...
Top five antivirus myths busted
And why do we still believe them? Anti-virus, or endpoint security plays an essential part in protecting Windows PCs. Whether you are working in the world’s largest enterprise, or using a small ...
Early protection systems
Can EDR really stop advanced targeted attacks? SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way ...
Weak Passwords Offer Easy Access to Enterprise Networks
Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
Cyber Security DE:CODED – Full attack chain testing
“Because we test realistically, sometimes bad guys come onto our test network and mess with us” Show notes for series 2, episode 9 (final episode of series 2) What is the attack ...
Cyber Security DE:CODED – Cheating in security testing
“If they chose the best products by rolling a dice then they should say so” Show notes for series 2, episode 8 If we’ve given the impression that we’re at the heart ...
Top 6 Email Security Technologies for the Enterprise
Email security refers to the measures taken to protect email communications from unauthorized access, use, disclosure, disruption, modification or destruction. It is important because email is a commonly used method of communication ...
LoginRadius Launches a CLI for Enterprise Dashboard
We are happy to announce that we have launched LoginRadius CLI for enterprise dashboard ...