Infosecurity Blogs
2019 Predictions: Part Two
As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store
2019 Predictions: Part One
As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store
The TrickBot and MikroTik Connection – A Story of Investment and Collaboration
The increasing involvement of MikroTik hosts in malicious activity.
Are Lawyers the Best Judge of Cybersecurity?
It's not just lawmakers who sometimes seem ill equipped when it comes to cybersecurity; lawyers can be far from perfect in this regard too.
The Importance of "S" in "CISO"
As cybersecurity has become the need of the business, we turn to our management for guidance from a CISO.
MIT’s Investment in AI a Harbinger of What is to Come
MIT is boldly investing in preparing students for a world that will be recalibrated by AI.
Cranes Exposed to Possible Cyber-Sabotage—What We Can Learn
Why the scenario of a hacked crane is a concern for wider cybersecurity.
Enterprises Need to Stop Playing Catch-Me-If-You-Can With Their Containers
Many enterprises aren’t even aware that they have deployed containers and orchestrated containerization.
Deceptioneering Part 2: Principles of Deception
Once you have a foundational knowledge of Deceptioneering, it is important to look at some practical applications.
Deceptioneering Part 1: Humans are Hardwired for Deception
The first part of a look at “Deceptioneering” and why human beings are so apt to fall for trickery.
A Strategic Approach to Improving Organizational Cyber Culture
What are organizations doing to make good cyber practices an everyday part of their regular activities?
Could 2019 be the End of Cookie Consent Forms?
How the upcoming ePrivacy Regulation will change the current Cookie law.
Patching and Policy Lessons Learned from WannaCry
IT and cybersecurity professionals that don’t make patching a priority are essentially shining a light on their organization’s weaknesses.
A Step in the Right Direction for Small Business Cybersecurity
The NIST Small Business Cybersecurity Act will help organizations gain access to mechanisms that only seemed attainable by larger, better-resourced organizations.
Open Banking to Close Gaps
As UK banks open their data via secure APIs, third-party providers will be required to adopt security-oriented approaches to enhance the Open Banking initiative’s objective of closing any security gaps.
EU Cybersecurity Certification: a Missed Opportunity
What about a standard for products, will the EU cybersecurity certification framework be a positive thing?
CISOs Reveal the Most Likely Culprits for Data Leaks
Data security issues can be profoundly damaging. How can your organization avoid them?
Artificial Intelligence Risks Call For Fresh Approaches, Expanded Collaboration
Time-tested approaches remain important, but traditional methodology will not be enough when it comes to artificial intelligence's potential impact.
Enter Crowdsourced Security, the Future of Pen Testing?
If crowdsourced security actually tackles the weaknesses in pen testing effectively.
Is it Time to Replace Pen Testing with Crowdsourced security?
As crowdsourced security emerges, are we ready to throw away pen testing as a methodology?