Infosecurity Opinions
Best Practices for the SOC Team – Where to Automate, Where to Think
Security Operations Centers (SOC) teams in organizations are finding it especially difficult to build teams with the right balance of skills and experience.
Finding Alternative Ways to Close the Security Gap
How does IT keep pace with all the new trends coming into the workplace, whilst ensuring that security is not compromised.
The Surprising Security Benefits of Data on Demand
Network speeds now routinely hit 100 Gigabits per second, or roughly 70 million times faster than the typical network connection.
Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap
Despite phenomenal growth, continued investment and a proliferation of new technologies, the cybersecurity industry is still fighting its biggest challenge yet – that of finding and retaining talented security professionals.
Why Cyber Protection Needs to be at the Scene of the Crime
The modus operandi of the new generation of cyber-attackers is best defined by two key facets.
How Secure is Your Company?
How secure is your company, really? Most security professionals can’t answer this fundamental question.
Why MX Records Matter in the Fight Against BEC and Spear Phishing
By implementing integrated MX-record monitoring, and proactively blocking inbound emails from these potential attack platforms, security is dramatically reducing the enterprises’ imminent risks from spear phish or BEC attacks.
Defending Against Malicious Domains
Cyber-criminals are constantly waging a cat-and-mouse game with threat researchers. Across the world, cyber-criminals rapidly create malicious domains as a base for launching cyber-attacks against organisations’ Domain Name System (DNS) infrastructure.
What does SIEM stand for?
While it is widely understood – and required by regulation – that the availability of accurate log data is a mandatory requirement for a working security incident management process, many organizations are still struggling to make sense out of it.
Defending Advanced Persistent Threats - Be Better Prepared to Face the Worst
APT, with its sophisticated and mercurial way of achieving its focused objectives, represents a fundamental shift in the traditional cyber-attack models
2016: Time for Security to Take its Head out of the “Sand” (box)
Containment is a fairly new concept, deviating from the widely known and popular “sandboxing” method.
The Virtual Mobile Infrastructure Debate is Mired in Myth
Regarding usability, VMI decriers assume that user experience must suffer. It must be too slow and sluggish, they say. It won’t feel native, they presume. It’s just too niche for most businesses, they claim.
Why Educating Employees is Key to Preventing the Risk of Shadow IT
Why aren’t staff practicing what they preach when it comes to data security?
National Infrastructure Attacks Mark Ominous Milestone for Cyber Security
The world of cybercrime expands each day, leading to the current state of affairs in which even national infrastructure organizations are vulnerable to the growing sophistication of hackers.
Handling Sensitivity in the Biotech World
A company responsible for financing of a firm has significant intelligence on the operations of an organization and how it intends to use the resources available.
Information Security Culture: It’s Time to Upgrade to 2.0
With the rapidly changing threats we now face, businesses need new approaches to information security and professionals that can think strategically about big picture challenges while having the tactical acumen and agility to respond to threats.
A New Era of Cyber Threats: The Infrastructure Hack
CNI is not immune to cyber-attacks - IoT, Big Data and cybercrime have increased the attack opportunity.
Joined up Justice - Exploring the Art of Possible through Digital Integration
Across Europe, central and local government departments are challenged by the need to drive greater digital initiatives enabling digital integration across their own department and the departments with which they collaborate and coordinate.
Four Qualities of a Successful Cybersecurity Start-up
Four of the common traits and strategies that are particularly relevant in the world of cybersecurity
The Need for IT Support to Evolve From Reactive to Proactive
For IT departments, the most visible indicators of success are making sure employee end-users can access critical applications and IT services whenever and wherever they need them and with sufficient performance to do their jobs.