Infosecurity Blogs
The Dangers of Running an Unsupported OS
Running an unsupported OS leaves servers open to problems and attacks
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life
Evolving Web Application Supply Chain Threats
Attention is being turned to the supply chain that makes up modern web applications.
Cybercrime is Winning – What Are You Going to Do About It?
Turning the tide in the ongoing battle with cyber-criminals
A Country in Crisis: Data Privacy in the US
In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak
Timely Opportunities Exist to Address Longstanding Security Gaps
Could the other side of the pandemic see green shoots of a skills shortage resolution?
How to Check for Breached Passwords in Active Directory
It’s never been more important to check for leaked passwords in Active Directory
Huawei CSO: Secure Networks Do Not Trust Anyone
If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options
Who is Responsible for End-of-Life Data Destruction?
End-of-life data destruction should not be an additional responsibility heaped on an IT team
Security by Sector: Insecure Data Sharing Practices Putting Educational Orgs at Risk
Survey finds 82% of educational organizations do not track data sharing at all or do it manually
Cloud-Native Threats in the COVID-19 Pandemic
Shadow traffic poses a serious risk as it isn’t inspected and creates a gate to corporate resources.
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
No one handling sensitive data should become complacent or take a lax approach to the security of sensitive data
Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud
Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams
Click Here to Find Out Who Falls for Scams
What persuaded you to click was most likely some form of social proof.
Why Data Centers Need Formal Data End-of-Life Processes
Data centers are at the heart of both the problem and solution regarding sensitive data storage
Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks
New survey highlights trust issues surrounding banking-related digital communications
Implementing Effective Remote Incident Response in a Pandemic
Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites
Data Security and Decommissioning in a 5G and Streaming World
For businesses that store and handle data, 5G transition will present costly security risk challenges
Working from Home During #COVID19: Increasing Threats
Cyber-criminals will always try to capitalize on any significant events happening in the world
Remote Workforces: Security Challenges Amid #COVID19
Common challenges organizations are facing as they transition their workforce