Infosecurity Blogs
Why 10,000 Years of Disinformation Will Not Suddenly Go Away
Today misinformation can be spread in the blink of an eye (or the tap of a keystroke
COVID-19 and Cybersecurity Staffing Shortages
Why staffing shortages are getting worse and how to address the issue
Time to Pardon Edward Snowden?
Edward Snowden, in the end, did the right thing by notifying the public of illegal privacy violations, and it’s time he came home
Three Reasons Why Password Self-Service Enrollment Fails, and What to Do About it!
Password self-service enrollment needs to be a process that is intuitive, simple and non-invasive
Repairing SQL Database Corruption with CHECKDB Repair? You Can Lose Your Data Forever
An enterprise database repair tool can plug gaps in your SQL database maintenance and restoration strategy
Credential Stuffing: the Culprit of Recent Attacks
Credential stuffing attacks use stolen usernames and password combinations
IR Planning – It Is Not Optional!
Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response
Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems
Ransomware attacks are adopting an approach defined as “double extortion"
Cyberwarfare: the New Frontier of Wars Between Countries
Cyberwarfare can be launched instantly, making it difficult to counter
A New Path for Data Protection
Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding
Using Self-Service Password Reset Tools to Support Remote Workers
Password resets have always been problematic for helpdesks
Focus on Continuous Learning, Not Passing Exams
Continuous learning is done by teaching humans to think for themselves and be creative
Stop the Cyber-Attack Cycle with Privileged Access Management
Securing privileged access helps shrink the attack surface
Is the Security Department a Barrier for Progression or are they Misunderstood?
Is the security team, "The Department of No?"
Distributed Working Demands New Levels of Data Security at the Edge
Lockdowns and quarantines have rapidly changed how organisations of all sizes operate
Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices
The critical considerations for migrating an on-premises email organization to Office 365
Is it Finally the End of Adobe Flash Player?
With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?
Twitter Hack Exposes Security Holes
Lessons learned form the recent Twitter breach
Rethinking Security: The Merging of Personal and Professional
Steps organizations can take to reduce the security vulnerabilities of distributed workforces
How AI is Becoming Essential to Cyber-Strategy
Artificial neural networks can allow an AI to self-determine what features it uses to reach a conclusion