enterprise
Cybersecurity Goals Conflict With Business Aims
A study from Forrester Consulting found most organizations face challenges aligning cybersecurity priorities with business outcomes ...
Zero-Trust: 5 Steps to Transition From Hype to Reality
The paradigm shift toward zero-trust has been years in the making for some organizations, while others still regard it as an aspiration. Although many organizations have touted their success in implementing the ...
Endpoint Detection Compared
We compare endpoint security products directly using real, major threats How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a ...
Does it matter if your company is hacked?
And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they ...
How to make your phishing campaign a success
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading ...
SUSE Survey Surfaces Multiple Cloud Security Challenges
A survey of 501 IT professionals based in the U.S., United Kingdom and Germany published today found that, on average, organizations were impacted by four cloud-related security incidents in the past year ...
DIY email security
Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? ...
Top five antivirus myths busted
And why do we still believe them? Anti-virus, or endpoint security plays an essential part in protecting Windows PCs. Whether you are working in the world’s largest enterprise, or using a small ...
Early protection systems
Can EDR really stop advanced targeted attacks? SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way ...
Weak Passwords Offer Easy Access to Enterprise Networks
Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...