Infosecurity Blogs
Security by Sector: ICS/OT Cybersecurity Risk is at Critical Level, Say Security Pros
More damning data regarding the cyber-risks surrounding industrial control systems and operational technology
No Substitute for Experience – Or CISOs’ Backgrounds
Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity
The Big Connect: How Data Science is Helping Cybersecurity
How data science is being used to protect our information
The Importance of a Cybersecurity Strategy for the Business
It is unfortunate that some companies still consider malware to be a minor threat
Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?
Is the appointment of a threat intelligence team enough?
The Changing Face of Cybersecurity: Protecting Consumers and SMEs
Small businesses leak information that criminals can freely obtain and abuse
Embracing Your Legacy: Protecting Legacy Systems in a Modern World
Legacy infrastructure is still a crucial part of enterprises across many industries
Security by Sector: Digital Transformation in the Healthcare System
The healthcare industry has traditionally struggled with information security
How Many Passwords Should be in a Password Blacklist?
The answer should be as many as possible, but current advice is conflicting
Should the UK Ban Huawei?
A ban on Huawei is actually the wrong approach
Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record
An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm
The Rise of Account Takeover Fraud in the Media Industry
A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models
On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats
A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market
Security: a Missing Ingredient in Many DevOps Implementations
The most successful organizations of the future will make DevSecOps a cornerstone of their business operations
The Security Landscape is Constantly Evolving: Are You Ready?
The one certainty in the world of cybersecurity is that change is imminent
Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment
The need for micro-segmentation as a security solution is not new
Incident Response: Endgame
What incident response lessons can we learn from the latest Marvel episode?
Understanding ICO Password Recommendations
Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data
Perspective Changes Everything: Shift Your Focus to the Edge
There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed
Survival of the Fittest: Take Security to the Edge
Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem