Infosecurity Blogs
Major Lessons to be Learned from 2020 Security Mishaps
Attacks have caused damage and presented several key lessons moving forward
Securing IT During the Pandemic: Report Reveals Cyber-Readiness Challenges
Organizations must focus on strategies and solutions that are highly adaptable, integrated and proactively protective
How COVID-19 Forced Forex Software Providers to Improve Security
Financial authorities have been warning forex traders about the heightened threat of security breaches
ISO 27001: Recognizing the Importance of Operational Security
Good operational security is crucial, but it’s not always appreciated and is often challenging to execute consistently
Defending U.S. Voting Processes Now and into the Future
2020 has created the perfect storm of challenges for the democratic process this year.
The Changing Cyber-Landscape and How Organizations Can Reduce the Risks
IT teams need to adapt and become more agile to keep nefarious actors at bay
Why 10,000 Years of Disinformation Will Not Suddenly Go Away
Today misinformation can be spread in the blink of an eye (or the tap of a keystroke
COVID-19 and Cybersecurity Staffing Shortages
Why staffing shortages are getting worse and how to address the issue
Time to Pardon Edward Snowden?
Edward Snowden, in the end, did the right thing by notifying the public of illegal privacy violations, and it’s time he came home
Three Reasons Why Password Self-Service Enrollment Fails, and What to Do About it!
Password self-service enrollment needs to be a process that is intuitive, simple and non-invasive
Repairing SQL Database Corruption with CHECKDB Repair? You Can Lose Your Data Forever
An enterprise database repair tool can plug gaps in your SQL database maintenance and restoration strategy
Credential Stuffing: the Culprit of Recent Attacks
Credential stuffing attacks use stolen usernames and password combinations
IR Planning – It Is Not Optional!
Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response
Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems
Ransomware attacks are adopting an approach defined as “double extortion"
Cyberwarfare: the New Frontier of Wars Between Countries
Cyberwarfare can be launched instantly, making it difficult to counter
A New Path for Data Protection
Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding
Using Self-Service Password Reset Tools to Support Remote Workers
Password resets have always been problematic for helpdesks
Focus on Continuous Learning, Not Passing Exams
Continuous learning is done by teaching humans to think for themselves and be creative
Stop the Cyber-Attack Cycle with Privileged Access Management
Securing privileged access helps shrink the attack surface
Is the Security Department a Barrier for Progression or are they Misunderstood?
Is the security team, "The Department of No?"