Infosecurity Next-Gen Infosec
Is Using a VPN Illegal?
What are the issues around hiding your identity and gaining access to blocked content via VPN?
Refreshing Cyber Awareness Training
Cybersecurity awareness training needs a refresh to make it engaging, interesting and relatable
Will 5G Technology Increase Mobile Security?
What are the security benefits and shortcomings of 5G technology?
The Biggest Cyber-Threat Isn't Hackers, It's Insider Threats
Insider threats are a bigger danger to enterprise security than external forces are, and organizations must act
Vulnerability Management With Applied Context
Context must be applied to the process of remediating vulnerabilities to protect your business effectively
The Benefits and Challenges of Passwordless Authentication
Moving from conventional passwords to a more secure authentication method will improve an organization’s overall security
Why Understanding Data Privacy is More Important Than Ever
Improving knowledge on data privacy will help both individuals and businesses keep their critical data safe
The Principles and Technologies Heralding the Next Cybersecurity Revolution
Next gen cybersecurity technologies will need to authenticate everything that tries to access a network
The Top Five Ecommerce Security Threats to Watch Out for in 2021
In 2021, ecommerce will continue growing rapidly, and so will related cybersecurity threats
Risk Evaluation and Management in the Age of the Connected Supply Chain
Many orgs require a change of mindset in their approach towards cybersecurity
A Guide to Choosing a Hosting Platform for Your Business
The pros and cons of hosting options
WhatsApp Chaos: Time for a Comprehensive Data Security and Privacy Law?
WhatsApp hit the headlines with the launch of its new terms and conditions
New Ethical Concerns in Online Privacy and Data Security
Companies should be more responsible in how they handle customer data, and customers should be more careful about the info they share with brands
The Future of Govt Engagement in Open Source Technology and Crowdsourcing
Knowledge must be shared for it to expand with the help of a community, and this is exactly what open source does
A Case Against CVSS
The CVSS standard has become a blight upon enterprise security
The Great Authentication Gap: How Password Habits Differ Across Generations
We all, to some extent, assume older people are less knowledgeable about technology
Becoming the Enemy: How Ethical Hacking Changes Your Outlook on Security
How does understanding the offensive side of the cyber playing field change how you perceive security?
How COVID-19 Tilted the Scale in Favor of VPNs
VPNs have become a must-have for remote workers to do their jobs during the pandemic
Principles of Effective Cybersecurity Wargames
Why use wargames (or ‘serious games’) as an educational mechanism?
Two Cybersecurity Threats Retailers Should Watch Out for During the 2020 Holiday Season
Unless a retailer understands how these attacks work and how to preve them, it will affect sales.