Explore Security
Latest about Security
Explained: The state of end-to-end encryption in the UK now the Online Safety Bill saga is over
By Ross Kelly published
Analysis Industry stakeholders have previously criticized the Online Safety Bill over its heavy-handed approach to encryption
Novel China-linked Linux backdoor exploits organizations that fail to patch old vulnerabilities
By Ross Kelly published
News The threat should serve as a “wake-up call” for organizations running Linux, an expert has said
Are you ready for NIS2?
By ITPro published
WEBINAR Find out what you should be doing to prepare for the EU’s latest data protection regulation and UK equivalent with our free webinar
Level up your log management: Six-phase strategy for achieving continuous improvement
By ITPro published
whitepaper Improve security operations, manage risk more effectively, and gain intelligent digital forensics capabilities.
Threat intelligence integration: From source to secure
By ITPro published
whitepaper Discover what to consider when choosing a source of threat intelligence
Ultimate guide to monitoring and logging requirements
By ITPro published
whitepaper Discover how you can comply with multiple regulations and industry standards
Optimizing SIEM with log management
By ITPro published
whitepaper Get guidance on how you can get maximum protection from your SIEM solution
A CISO’s guide to log management for cybersecurity
By ITPro published
whitepaper Gain the ability to collect, aggregate, and correlate data more effectively
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.