FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

MDR is the answer – now, what’s the question?

β€” November 24th 2025 at 10:00
Why your business needs the best-of-breed combination of technology and human expertise
☐ β˜† βœ‡ WeLiveSecurity

Why shadow AI could be your biggest security blind spot

β€” November 11th 2025 at 10:00
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
☐ β˜† βœ‡ WeLiveSecurity

Ground zero: 5 things to do after discovering a cyberattack

β€” November 3rd 2025 at 10:00
When every minute counts, preparation and precision can mean the difference between disruption and disaster
☐ β˜† βœ‡ WeLiveSecurity

Recruitment red flags: Can you spot a spy posing as a job seeker?

β€” October 28th 2025 at 10:00
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
☐ β˜† βœ‡ WeLiveSecurity

How MDR can give MSPs the edge in a competitive market

β€” October 27th 2025 at 10:00
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
☐ β˜† βœ‡ WeLiveSecurity

IT service desks: The security blind spot that may put your business at risk

β€” October 15th 2025 at 09:00
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
☐ β˜† βœ‡ WeLiveSecurity

The case for cybersecurity: Why successful businesses are built on protection

β€” October 7th 2025 at 09:00
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
☐ β˜† βœ‡ WeLiveSecurity

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

β€” October 3rd 2025 at 09:00
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
☐ β˜† βœ‡ WeLiveSecurity

Small businesses, big targets: Protecting your business against ransomware

β€” September 18th 2025 at 09:00
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
☐ β˜† βœ‡ WeLiveSecurity

Are cybercriminals hacking your systems – or just logging in?

β€” September 11th 2025 at 08:55
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
☐ β˜† βœ‡ WeLiveSecurity

Preventing business disruption and building cyber-resilience with MDR

β€” September 9th 2025 at 09:00
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
☐ β˜† βœ‡ WeLiveSecurity

Under lock and key: Safeguarding business data with encryption

β€” September 5th 2025 at 08:53
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
☐ β˜† βœ‡ WeLiveSecurity

The need for speed: Why organizations are turning to rapid, trustworthy MDR

β€” August 19th 2025 at 09:00
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
☐ β˜† βœ‡ WeLiveSecurity

Supply-chain dependencies: Check your resilience blind spot

β€” August 12th 2025 at 14:08
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

β€” August 8th 2025 at 14:25
A sky-high premium may not always reflect your company’s security posture
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

β€” August 7th 2025 at 16:03
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

β€” August 7th 2025 at 14:23
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
☐ β˜† βœ‡ WeLiveSecurity

How government cyber cuts will affect you and your business

β€” July 3rd 2025 at 09:00
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
☐ β˜† βœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

β€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
☐ β˜† βœ‡ WeLiveSecurity

Resilience in the face of ransomware: A key to business survival

β€” March 31st 2025 at 09:00
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
☐ β˜† βœ‡ WeLiveSecurity

Making it stick: How to get the most out of cybersecurity training

β€” March 28th 2025 at 10:00
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill β€˜sticky’ habits that will kick in when a danger is near
☐ β˜† βœ‡ WeLiveSecurity

AI-driven deception: A new face of corporate fraud

β€” March 10th 2025 at 10:00
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
☐ β˜† βœ‡ WeLiveSecurity

Patch or perish: How organizations can master vulnerability management

β€” February 5th 2025 at 10:00
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
☐ β˜† βœ‡ WeLiveSecurity

Untrustworthy AI: How to deal with data poisoning

β€” January 30th 2025 at 10:00
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
☐ β˜† βœ‡ WeLiveSecurity

The evolving landscape of data privacy: Key trends to shape 2025

β€” January 23rd 2025 at 10:00
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
☐ β˜† βœ‡ WeLiveSecurity

Under lock and key: Protecting corporate data from cyberthreats in 2025

β€” January 21st 2025 at 10:00
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
☐ β˜† βœ‡ WeLiveSecurity

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

β€” January 7th 2025 at 10:00
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

β€” December 18th 2024 at 10:00
While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year
☐ β˜† βœ‡ WeLiveSecurity

Achieving cybersecurity compliance in 5 steps

β€” December 3rd 2024 at 10:00
Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements
❌