Infosecurity Blogs
Security by Sector: Construction Industry “Most Vulnerable” to Phishing Scams
Report reveals which industries are most likely to fall for phishing attacks
Why Wednesday Could be the Riskiest Day for Your Business
Are we placing too much pressure on people to act, and act perfectly, 100% of the time?
How to Fill the Cybersecurity Skills Gap
With cyber-attacks increasing in frequency and severity, we need to upskill existing IT and computer science professionals to meet demand
Security Engineers: Fighting Every Minute of Every Day
How security engineers successfully mitigate the world’s worst cyber-attacks
Security by Sector: ICS/OT Cybersecurity Risk is at Critical Level, Say Security Pros
More damning data regarding the cyber-risks surrounding industrial control systems and operational technology
No Substitute for Experience – Or CISOs’ Backgrounds
Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity
The Big Connect: How Data Science is Helping Cybersecurity
How data science is being used to protect our information
The Importance of a Cybersecurity Strategy for the Business
It is unfortunate that some companies still consider malware to be a minor threat
Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?
Is the appointment of a threat intelligence team enough?
The Changing Face of Cybersecurity: Protecting Consumers and SMEs
Small businesses leak information that criminals can freely obtain and abuse
Embracing Your Legacy: Protecting Legacy Systems in a Modern World
Legacy infrastructure is still a crucial part of enterprises across many industries
Security by Sector: Digital Transformation in the Healthcare System
The healthcare industry has traditionally struggled with information security
How Many Passwords Should be in a Password Blacklist?
The answer should be as many as possible, but current advice is conflicting
Should the UK Ban Huawei?
A ban on Huawei is actually the wrong approach
Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record
An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm
The Rise of Account Takeover Fraud in the Media Industry
A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models
On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats
A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market
Security: a Missing Ingredient in Many DevOps Implementations
The most successful organizations of the future will make DevSecOps a cornerstone of their business operations
The Security Landscape is Constantly Evolving: Are You Ready?
The one certainty in the world of cybersecurity is that change is imminent
Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment
The need for micro-segmentation as a security solution is not new