Advertisement

CW > Microsoft Store  / abstract download

Sideloading attacks explained: How a malicious app can bring down a business

A new sideloading malware campaign targeting Windows uses phishing and social engineering tactics that can be difficult for users to spot.


cio 100 article ac final 1200

Now Available On Demand

Join the CIO 100 Conference as the leading UK CIOs share best practices and we highlight the best submissions in 2021. From how CIOs are now ‘leading from the front’ to becoming cultural change agents, speakers will share how they have become successful advocates in their business and created a new focus on product development, innovation, and sustainability.

Advertisement

cio summit 2021 article thumb 1200

Now Available On Demand

Join the leading CIO community for unparalleled peer insight and expertise on business and IT strategy, innovation and leadership. Over 3 days, 50+ CIO Speakers will discuss where new technology investments are being made, talent and the new way of working as well as digital transformation while keeping systems resilient and agile.

cso 30 article v2

Now Available On Demand

The CSO 30 aims to recognise 30 outstanding senior security professionals in the UK – from CSOs to CISOs, Heads of Security and equivalent – for demonstrating outstanding business value and thought leadership within their organisation.

facial recognition - biometric security identification

UK ICO to fine Clearview AI £17 million for data protection law breaches

The facial recognition company is cited for not having proper data protection processes in place or a lawful reason to collect personal information, among other violations.


15 troubleshoot printer

New HP MFP vulnerabilities show why you should update and isolate printers

Researchers have discovered two dangerous vulnerabilities in HP multifunction printers that use its FutureSmart firmware, including one that is exploitable remotely.


Security threat   >   One endpoint on a network has been compromised.

GoDaddy WordPress data breach: A timeline

Domain registrar GoDaddy recently announced a data breach impacting 1.2 million customers via its Managed WordPress hosting environment. Here's how the breach is unfolding.


API security alerts displayed on monitors amid binary code / application security

5 tips for reducing false positive security alerts

SOC analysts spend too much time and effort chasing security alerts that incorrect indicate a vulnerability where none exists.


bpinkard vodafone headshot

Vodafone head of cyber defence reflects on complexities of cybersecurity in telecoms

Head of global cyber defence and member of the UK CSO30 2021 Becky Pinkard discusses Vodafone's risk-based approach to cybersecurity as the telecoms industry evolves.


Advertisement

A group of business leaders / board members with questions.

13 traits of a security-conscious board of directors

A CISO's success (and job longevity) is often dependent on support from the board of directors. Answers to these questions will reveal how security savvy a BoD is.


iot security startups hot highlights planets rocket lock security

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...


A person leaps between platforms surrounded by sharks. [danger / risk / challenges]

Enhancing zero trust access through a context-aware security posture

Cybercriminals prefer to attack organizations at sensitive times such as during a merger or earnings release. Adjusting zero-trust policies during those times will help mitigate that risk.


dark web negotiating making a deal communication argue debate hiding solarseven getty

9 tips for an effective ransomware negotiation

If you have no choice but to pay attackers to get critical data back, these best practices could put you in the best possible position to recover from a ransomware attack.


CSO  >  malware / virus / security threat / protective antivirus shield

How to prevent sideloading attacks in Windows and Office 365

A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.