Infosecurity Blogs
Distributed Working Demands New Levels of Data Security at the Edge
Lockdowns and quarantines have rapidly changed how organisations of all sizes operate
Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices
The critical considerations for migrating an on-premises email organization to Office 365
Is it Finally the End of Adobe Flash Player?
With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?
Twitter Hack Exposes Security Holes
Lessons learned form the recent Twitter breach
Rethinking Security: The Merging of Personal and Professional
Steps organizations can take to reduce the security vulnerabilities of distributed workforces
How AI is Becoming Essential to Cyber-Strategy
Artificial neural networks can allow an AI to self-determine what features it uses to reach a conclusion
The Russia Report: A Need for Large-Scale National Protective Interventions
The findings of the ISC’s Russia Report will instigate new investigations and lines of inquiry about government security globally.
Dangerous Liaisons - Cloudphishing
The growing adoption (and exploitation) of cloud services requires a cloud-native security approach
Data Security and Third-Party IT Asset Disposition: A Paradox
The only truly secure method of IT asset disposition is in-house drive destruction
Patching OpenSSL and GNU C Libraries Without Service Restarts
Organizations in all industries must ensure they are promptly mitigating vulnerabilities to prevent exploitation
Building Cyber-Maturity Through Understanding Supply Chain Risks
A holistic approach, with proper management mechanisms in place, can increase cyber-maturity and reduce organizational risk
NIST Password Guidelines: What You Need to Know
Organizations’ best line of defense hinges on the ability to ensure security at the password layer
Using Trademarks to Combat COVID-19 Related Phishing
Straightforward domain name procedures can provide efficient relief against fraudulent websites and email.
Managing the Cybersecurity Threat Landscape with a Standard Approach
Certification against ISO 27001 shows that an organization takes information security seriously
The Challenge of Third-Party Compliance Management
As the regulatory landscape becomes more complex, many organizations lack resources to conduct a complete compliance program
Your Employees Are Reusing Passwords – Find Out How Many
Do you know your employees’ personal passwords? Well, you actually might!
Busting the Top Myths About Privileged Access Management
PAM solutions are a critical layer of defense
Exposed Code in Contact Tracing Apps: Copycats and Worse
Attack scenarios share a common characteristic: the ability to tamper with the integrity of contact tracing apps.
Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen
In light of the COVID-19 pandemic, a new challenge is beginning to arise – the need to change or reset passwords remotely
The Shifting Sands of Data End-of-Life Destruction
Ever-increasing data volume is driving change in technology and associated compliance regulations