Employee Spotlight – Joseph Pike

Employee Spotlight – Joseph Pike

We spoke to Security Analyst, Joseph Pike For this month’s employee spotlight piece, we spoke to Security Analyst and heavy metal enthusiast, Joseph Pike. How long have you been working at SE ...
Does it matter if your company is hacked?

Does it matter if your company is hacked?

And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they ...
IAST Integrate SAST Tools with DevSecOps

How to Use a SAST Scanner

The pressure is on for organizations to deploy applications faster than ever before. Users and clients are hungry for new, innovative and accessible technologies, and businesses continue to embrace digital transformation to ...
Security Boulevard
DIY email security

DIY email security

Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? ...
Top Five Antivirus Myths Busted

Top five antivirus myths busted

And why do we still believe them? Anti-virus, or endpoint security plays an essential part in protecting Windows PCs. Whether you are working in the world’s largest enterprise, or using a small ...
Early protection systems

Early protection systems

Can EDR really stop advanced targeted attacks? SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way ...
3 Reasons Why Cybersecurity Fails

3 Reasons Why Cybersecurity Fails

How businesses and home users can make improvements to protect themselves The number of stories in the mainstream press about the devastation that hackers cause is proof enough as to who has ...
Schools cybersecurity training

Schools cybersecurity training

SE Labs runs second cybersecurity education programme for schools About Level:Up SE Labs is running its Level:Up security education programme for the second year in a row, partnering with local schools to ...
Ransomware Detection Using Hardware

Ransomware Detection Using Hardware

Computer processors get the final word when running programs. Can they judge bad code from good? Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection. All ...