Infosecurity Opinions
#HowTo: Fight the Use of Deepfakes in ID Theft
The ability to tell fake content from reality and how this applies to our online identities is a growing challenge amid the rise of deepfakes
#IWD2023: Learning Lessons to Boost Female Representation in Cybersecurity
Ahead of this year's International Women’s Day, Elizabeth Barr considers women’s status within cybersecurity
What the ADPPA Could Mean for Mid-Market Businesses and Startups
With the ADPPA legislation focusing on AI algorithms as well as data governance, it is vital businesses are prepared
The Cybersecurity Hype Cycle of ChatGPT and Synthetic Media
Many organizations will ultimately need a program to defend against this new class of threats
#HowTo: Accelerate Detection and Response in the Cloud
Enriching network traffic data can make SecOps analysts more effective
Should we Make Ransomware Payments Illegal?
With Australia contemplating a ban on ransomware payments, Will Dixon questions whether this will be a wise move
Why Organizations Should Not Rely on the New EU US Privacy Framework in the Long-Term
Roberts & Obradovic Law Group discuss the risks of relying on the new EU US Privacy Framework for data transfers
Cybersecurity Burnout – Human vs Machine
Current ways of working in cybersecurity have become outdated and unsustainable, creating a volatile operational cocktail
#HowTo: Update Software Securely
David Higgins from CyberArk highlights five best practices to follow when updating software as part of a wider defense-in-depth strategy
CISA’s Recognition of Security Control Validation is a Major Milestone
CISA recently issued an alert advising organizations to validate security control effectiveness
Will CMMC 2.0 Prove a Help or Hindrance to Defense Contractors?
The US federal government has created a simplified and more flexible version of the CMMC model, but will it have the desired impact in reality?
Why Keeping Your Gaming Console Secure Should be a Priority in 2023
With gaming cyber threats on the rise, Jasson Casey, sets out steps gamers can take to improve their online security
#HowTo: Maximize Security ROI Amid an Economic Downturn
By incorporating automation, security teams can demonstrate program value to leadership, reduce costs and bring transformational change to the business
Schools Out for Ransom: Education Under Attack
Cyberis' Matt Lorentzen details the unique cybersecurity challenges facing the education sector
SMBs Should Increase Cybersecurity Investment Despite the Economy
Cyber-criminals see a recession as an opportunity to attack companies at their weakest, meaning SMBs can't afford to reduce investment in security
The Security Challenge of Open Source Software
A more collaborative approach to security is needed to ensure open source is secure in the future
#HowTo: Protect Healthcare Providers' Data
Pharma companies must offer robust data security and privacy in their marketing practices today
Is Insurance the Solution to, or the Enabler of, Ransomware?
The data held by insurance companies can improve organizations' defenses against ransomware attacks
Taking the Attacker View to Protect the Growing Attack Surface
The preventive and response strategy of security teams is in dire need of revaluation in the post-pandemic threat landscape
Are we Losing the War Against Ransomware?
Changing approaches to ransomware, such as RaaS and the development of new tools, are making this vector more dangerous to organizations