Infosecurity Blogs
Three A's to Look For When Considering a SAST Tool
Three ways to lay a solid foundation to support an effective, accurate and holistic security program
The Exploitation of Cloud Services Continues in 2022
With cyber-criminals using increasingly sophisticated attack methods, organizations must evolve their security strategies
Securing the UK's Operators of Essential Services Against Cyber-Attacks
Why preparedness is one of the most important elements for an effective response
Greater IT Connection Means Greater Ransomware Risk on the Mainframe
Now is the time to recognize the risks the mainframe poses and take steps to avoid a potential disaster
Disruption 3.0 But Scams 1.0
Javvad Malik discusses the security challenges posed by the growth of Web 3.0
Five Tough Questions CEOs Should Be Asking Their CISOs
The time to ask these tough questions is before incidents occur, not in after-action reviews
Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows
Why cybersecurity compliance remains a driving force underlying business success
A Ransomware Outlook for 2022
The past two years have seen ransomware attacks become both more sophisticated and bolder; what trends are expected for 2022?
The Vulnerability of the UK's 'Just in Time' Supply Chain
Why the resilience of the UK’s supply chain against cybercrime can be significantly improved
'Hack One, Breach Many' Is Here to Stay: How to Secure Your Third-Party Risks
‘Hack one, breach many’ is here to stay so secure your access points before it’s too late
2022 – Predictions for the Year Ahead
Javvad Malik reveals some of the cybersecurity trends he expects to come to fruition in 2022
3 Reasons Why DDoS Protection Fails
Improved DDoS skills and knowledge translate into the effects of an attack being mitigated quickly
Cloud Security Best Practices: Stop Making Your Cloud Rain Shells
With more sensitive data kept in the cloud as organizations move to cloud networks, security must be at the forefront
Mitigating Cloud Security's Greatest Risk: Exposure
Why increasing cloud complexity is making security as challenging as ever
Why Is Data Destruction the Best Way to Impede Data Breach Risks?
Devices no longer needed are required to be wiped permanently with a certified data sanitization tool
Challenges of Industrial Cybersecurity
A sense of urgency is needed to address the unique needs of OT
Can the CISO Reporting Line Reveal Intel on Data Breach Causation?
How can we achieve full transparency of data breach causation?
AI Progress in Security is Impressive Enough Without Embellishment
Any claims that products and solutions are magically all-powerful due to AI are counterproductive
Healthcare Cybersecurity: Threats and Mitigation
Healthcare is an increasingly attractive target for cyber-criminals, and extensive security measures are required
How Automation Can Solve the Security Talent Shortage Puzzle
It’s simply impossible for humans to respond effectively to such a deluge through manual efforts alone