Information Security
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
There are many different options for pursuing a career in cyber security. In this guide, we outline the most common types of cyber security roles, so you can get a sense of which one will best fit your interests and goals.
By Sam Woolfe in Information Security on April 13, 2021
Comparitech researchers found one in 50 Android apps requests unnecessary permissions to access private user data and take potentially dangerous actions.
By Paul Bischoff in Information Security on June 7, 2022
Businesses continue to face an increasing range of sophisticated cyber threats. Find out about the trends we’re observing in 2021 and beyond and how to protect your business against the most serious cyber hazards.
By Aimee O'Driscoll in Information Security on August 4, 2023
Interested in becoming a data protection officer? We reveal the typical job description, how to get hired, salary expectations, and the top companies that are hiring data protection officers.
By Sam Woolfe in Information Security on April 8, 2021
Do you want to study cyber security but not sure what type of degree to obtain? In this guide, we reveal all the different cyber security degrees, the jobs that each can lead to, and the salary you can expect to earn after graduating.
By Sam Woolfe in Information Security on April 8, 2021
SIM swapping fraud is difficult to protect against but that doesn't mean you can't do anything about it. In this post, we look at how SIM swapping fraud works and how you can avoid it.
By Marc Dahan in Information Security on January 31, 2024
Fraud and cybercrime are major concerns for businesses of all shapes and sizes. Find out about the major threats and the steps you can take to prevent fraud and cybercrime.
By Aimee O'Driscoll in Information Security on January 25, 2024
Thinking about a career as an information security officer? We reveal the essential aspects of this role, including job responsibilities, how to get hired, salary expectations, and the top companies hiring.
By Sam Woolfe in Information Security on March 30, 2021
Page 19 of 48