Infosecurity Blogs
Was the Equifax CSO to Blame?
Companies should want well-rounded individuals that can manage people, understand the risks for the company, can communicate with the board, and understand legal ramifications.
Interview: What is the Future of IT Security?
Malgorzata Zabieglinska-Lupa discusses the most important questions regarding the challenges and latest trends influencing the security industry with Comarch’s Ewelina Kornas-Zarzycka
#ISC2Congress: Another Women in Cybersecurity Panel…
Women in cybersecurity panels aren’t all that rare these days. In fact, I almost skipped the one on the agenda at (ISC)2 Congress in Austin this week because I feel like I’ve been to so many that perhaps I need to take a break.
Securing Modern Assets in the Digital Transformation Age
One of the biggest challenges of today’s evolving IT landscape is visibility into modern assets.
How Humans (and Machines) Can Help Fight Phishing
If we are the weakest link in the cybersecurity infrastructure, shouldn’t we get rid of the human aspect altogether?
Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?
Healthcare organizations that are challenged with finding, onboarding and keeping cyber professionals might want to consider an MSSP
Important Information on New EU Regulations
Failure to comply with new guidelines will result in significant financial penalties
Why The Equifax Hack Doesn't Matter!
The Equifax breach doesn’t matter as your data was already out there!
In-House or Cloud? Where is More Secure?
There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget
Back to School 101: Cyber Hygiene For Students
Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.
Defray Attacks Highlight Trends in Ransomware Campaigns
Defray is a customized ransomware program that encrypts all files contained on a victim’s hard drive upon download and execution.
Security: Trends of Threats in 2017
Websites dealing with security issues are more and more frequently reporting new threats in the IT field
Destination Boston! The Journey so Far
One of the things that has struck me during the conversations I’ve had in the run up to the event has been the collaborative and vibrant nature of the East Coast infosec community.
Securing Hybrid IT: Considerations When Moving To a Mixed Ownership Model
Moving from traditional on-premise data storage to a hybrid IT environment means that internet-based cloud services are now involved.
The Role of CISO in the Face of the GDPR
GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.
Security: A High-Stake Soccer Match
If we delve into IT security, we discover it has more in common with soccer than would have been initially expected
For Phishing Protection, Rely on More than Users
If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.
CISO and CIO Strategic and Together, or Nothing
In a simplified holistic view, what we saw and continue to see today is an exponential movement of technology adoption
Adopting Performance Data into Your Security Strategy
It is essential that data centres use standard performance metrics as the basis of a comprehensive security policy and process.
A Culture of Security, Not of Blame
Technology continuously introduces huge amounts of security challenges and risk factors, which we keep blaming employees for not handling correctly. Blaming people for not handling poor technology correctly is - in my opinion - simply wrong.