Infosecurity Blogs
Ransomware: To Pay or Not to Pay?
Ransomware is an increasingly prevalent threat to small and medium-size business, but when is it right to pay a ransom?
Zero Days and Patch Lag: Stemming the Software Pandemic
Chrome has become the increasing subject of Zero Day Exploits owing to the unavoidable problem of patch lag
The Story of the EC-Council Gender Survey Scandal: Survey Creator Says "It Was Written by Women so it Can't be Sexist"
On Friday 09 April, EC-Council pushed out a ‘women in security’ survey poll on LinkedIn with three abhorrently sexist answer options. Eleanor Dallaway investigates…
How Security Culture Invokes Secure Behavior
Orgs should take steps to improve their security culture now
How SASE is Key to 5G Security Success
With the SASE model, orgs will have the opportunity to offer more secure 5G networks
Questions Enterprises Should Be Asking as they Migrate to the Cloud
What steps should orgs take to ensure a secure move to the cloud?
Risk Management Program Development 101
What are the steps orgs need to take to develop a successful risk management program?
Blurring Boundaries: Keeping ‘Consumer’ Scams Out of the Business Environment
Every business should act now to safeguard themselves and mitigate the impact of an attack
Who Should Own Third Party Risk Management?
TPRM’s role in keeping orgs safe from cyber-attacks creates differing opinions on where it should reside
#COVID19, Password Spraying and the NHS
How password spraying risks threatens the NHS
Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis
Organizations need to ensure their awareness programs are relevant and targeted
Why Quantum Computers Pose a Very Real Risk to Cybersecurity
The quantum threat, why it matters and why addressing it cannot wait
Cybersecurity Survivorship Bias and How to Avoid it
Why orgs should avoid falling into survivorship bias
Password Security for Furloughed Employees
Companies must continue to consider cybersecurity regarding furloughed employees
Cloud Services Are Top-of-Mind for Phishers
The growth in cloud adoption is changing the phishing landscape
DDoS Ransom Attacks: What You Need to Know
Adverse impacts of a ransom attack can be curbed if dealt with swiftly
Premier League Teams Train Together in Defense Against Cyber-Attacks
The English Premier League is a high-value target for would-be cyber-attackers
Security by Design Implementation Insights
How can orgs implement a successful security-by-design strategy
Healthcare Carries a Large Target for Ransomware
How can healthcare orgs protect themselves from the threat of ransomware?
CISO Stories: Part One
Part one of Nadine Michaelides’ CISO Stories series tells the tale of a CISO working in the chemical industry