Explore Security
Security
Latest about Security

Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
By Emma Woollacott published
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.

How an online B2B resale platform helps handle post-holiday returns
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

The State of B2B Recommerce
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

Solving the sustainability problem: Fueling the secondary market with high-value goods
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

The Zservers takedown is another big win for law enforcement
By Solomon Klappholz published
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline

There’s a new ransomware player on the scene
By Solomon Klappholz published
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025

Unlock profitability with Cove Data Protection
By ITPro published
Whitepaper Agile risk management starts with a common language

Ransomware missteps that can cost you
By ITPro published
Whitepaper Agile risk management starts with a common language
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.