Infosecurity Blogs
The Role of CISO in the Face of the GDPR
GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.
Security: A High-Stake Soccer Match
If we delve into IT security, we discover it has more in common with soccer than would have been initially expected
For Phishing Protection, Rely on More than Users
If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.
CISO and CIO Strategic and Together, or Nothing
In a simplified holistic view, what we saw and continue to see today is an exponential movement of technology adoption
Adopting Performance Data into Your Security Strategy
It is essential that data centres use standard performance metrics as the basis of a comprehensive security policy and process.
A Culture of Security, Not of Blame
Technology continuously introduces huge amounts of security challenges and risk factors, which we keep blaming employees for not handling correctly. Blaming people for not handling poor technology correctly is - in my opinion - simply wrong.
Why You Need Private Browsing
If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again.
EU GDPR Final Countdown: How to Prepare Your Security Program
GDPR will have real-world impact, and not just for EU member states.
Is DDoS Protection Right For You?
What should a company do about DDoS? They should follow a risk-based methodology to judge cost and weigh it against benefits and ways to address the risk.
Key Details on the Australian Meta-Data Retention Law
As Australia's newly approved Data Retention law comes into effect, how does it actually affect the average internet user?
How To Sell Endpoint Security to Business Leaders
Engaging with C-suite execs, security pros can more effectively explain and advocate the need to invest while leading the business toward a safer future.
Why Bill 34 is Bad News for Internet Privacy
The S.J.Res. 34 bill has effectively destroyed the privacy of internet users in the US and has taken the world by storm.
The 'Dark RAT'
In March 2017, Fujitsu Cyber Threat Intelligence uncovered a newly developed remote access tool referred to by its developer as ‘Dark RAT'
The Domain Name and its Role in Cyber Forensics
It remains very easy for anyone to inexpensively buy a domain name, obtain an IP address and set up a host server.
The Security Challenges of Enterprise Container Adoption
The blending of development and operations processes into DevOps has also changed the way software is deployed.
Your 2017 Data Centre Security Checklist
There is big money to be made extorting an organization’s data center—or “brain”.
#WCSC17: A Day at World Cybersecurity Congress 2017
This week Islington’s Business Design Centre played host to the World Cybersecurity Congress 2017, with a schedule packed full of interesting sessions and discussions from speakers from a variety of different sectors and specialties
GDPR Compliance: Time to Face Mission Impossible?
The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data
The Rise of the Threat Hunter
Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.
#SecuriTay 2017 & the Future of An Industry
Held in Dundee’s Abertay University, and now in its sixth year, SecuriTay is organized by the Ethical Hacking Society and “aimed at anyone with an interest in hacking and information security”