Explore Security
Security
Latest about Security

Developer security best practices in a fast growing tech company
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

The new era of cyber threats
By Rory Bathgate published
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats

Everything you need to know about the Microsoft Power Pages vulnerability
By Solomon Klappholz published
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.

Microsoft is increasing payouts for its Copilot bug bounty program
By Nicole Kobie published
News Microsoft has expanded the bug bounty program for its Copilot lineup, boosting payouts and adding coverage of WhatsApp and Telegram tools.

The new ransomware groups worrying security researchers in 2025
By Kate O'Flaherty published
In-depth Who are the new ransomware groups on the block, what are their aims – and what are their novel attacks methods?

Why ‘malware as a service’ is becoming a serious problem
By Solomon Klappholz published
News Researchers have issued a warning over the rise of 'malware as a service' platforms amid a surge in attacks over the last year.

Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
By Emma Woollacott published
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.

How an online B2B resale platform helps handle post-holiday returns
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.