Infosecurity Blogs
An Inside Look at Hive’s RaaS Tactics
The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary
Compliance vs Security: A Look into Passwords
New research shows that relying on compliant passwords does nothing to protect your network
Digital Trust: From Brand Damaging to Brand Managing
How can organizations achieve consumer confidence in their security and privacy posture?
What You Should Do When Two-Factor Authentication Becomes a Security Requirement
The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses
How Ransomware Has Become a Geopolitical Risk for Governments
There has been a significant escalation in attacks targeting government organizations this year
The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe
Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?
Stand Down, Marketers: Zero Trust is Not a Product
If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size
Browser exploits: A Concerning Revival Led by the Lazarus Group
The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser
Modern Authentication for Multiple User Journeys - Best Guidance
If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout
Cyber Essential’s Password-Based Authentication Requirements
Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape
Let’s Rethink Cybersecurity Training Investment
We need to make training targeted to tasks we can realistically expect people to do
2022: A Checklist for the Year of Heightened Cyber Risk
Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks
What Law Firms Need to Know About Cybersecurity
Why law firms must put proactive security measures in place to detect and prevent data breaches
Cybercrime: A Clear and Present Danger
Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure
Travel and Hospitality Fraud is Growing: Here’s How it Works
An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware
How Threat Actors Weaponize Your Trust
Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind
A Smarter Cyber-Risk Management Strategy
Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business
New VIP3R Campaign Highlights the Dangers of Spearphishing
A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats
A Practical Lesson in Collaborative Security
Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance
Empathy: The Overlooked Ingredient in Cybersecurity
The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats