Advertisement

sas 2

Virtual Event - 12.00pm - 13.00pm CET

Join this exclusive digital roundtable as senior IT leaders from Benelux discuss and explore what analytics workloads work best in the cloud, and how to craft a strategy that supports a cloud-only or a hybrid-cloud model depending on business needs.

Advertisement

cso 30 article v2

Virtual Event - 9.30AM - 13.30pm GMT

The CSO 30 aims to recognise 30 outstanding senior security professionals in the UK – from CSOs to CISOs, Heads of Security and equivalent – for demonstrating outstanding business value and thought leadership within their organisation.

cio summit 2021 article thumb 1200

Now Available On Demand

Join the leading CIO community for unparalleled peer insight and expertise on business and IT strategy, innovation and leadership. Over 3 days, 50+ CIO Speakers will discuss where new technology investments are being made, talent and the new way of working as well as digital transformation while keeping systems resilient and agile.

Advertisement

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.


browser security

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.


certificate / gold seal certification

(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages

New certification aims to validate knowledge of foundational cybersecurity concepts and best practices to address skills gap. Is another cybersecurity qualification the answer?


binary cyberattack cybersecurity hacked protected

SSRF attacks explained and how to defend against them

Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. Defending against them can be relatively easy.


Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

8 top multifactor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.