Infosecurity Opinions
How to Mitigate the Cyber Risks of Energy Blackouts
Potential energy blackouts this winter could cause cyber risks for organizations if they aren't prepared
Beyond Google: The Real Problem with Data Privacy
We need to accelerate the adoption of new technologies, protocols and standards that prioritize the control of data by eliminating silos and copies
#HowTo: Make Security a Board Level Discussion
Creating a collective approach to cybersecurity starts from the top down, says Microsoft's Sarah Armstrong-Smith
Turning Data into Evidence to Accelerate SecOps Success
Contextual understanding of data is crucial to enhance network defenders' detection and response capabilities
Moving Away From a ‘Checklist’ Approach to Federal Compliance in Cloud Security
The way organizations implement federal cloud security frameworks determines the risk and therefore effectiveness of the controls
#HowTo: Secure On-Chain Data
Despite advancements in blockchain security, we currently live in an awkward time with a high experimentation factor and few security options
Cyber-Attacks on UK Councils – Why They Happen and What We Can Do About it
UK Councils have become a major target for cyber-criminals, and action must be taken to protect these bodies
‘Last Call’ to Prepare for Two US Privacy Laws
With only weeks remaining, organizations must ensure they are ready to comply with two US privacy laws going into effect on January 1, 2023
HowTo: Fight Cyber-Threats in the Metaverse
Now is the time to invest in training the architects of the Metaverse to navigate its security threats
Tech Addiction and Work Burnout Make us Prone to Phishing Attacks
Confronting the issues related to tech addiction will help your organization combat the potential of cyber-attacks
#HowTo: Build Trust in Your Software Through Insights
Organizations can benefit from learning from the experiences of peers to improve their software security
Cybersecurity Awareness: An Open Letter to CISOs
Now is the time to focus on long-term behavioral change rather than cybersecurity awareness, says Oz Alashe
How DDoS Disrupts Live Events
DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event
#HowTo: Secure Your Cloud Migration
Organizations must take action to strengthen its security posture amid cloud migration
What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem
Researchers have observed 10,666 ransomware variations in the past six months
Cyberwar is Changing – is Your Organization Ready?
Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare
#HowTo: Build Trust Between Developers and Security Teams
To make software more secure, we must overcome cultural differences between developers and security teams
Implementing Connected Place Cybersecurity Principles
What are the challenges authorities face when adopting the NCSC Cyber Security Principles?
#CyberMonth: A Time to Change Behaviors
KnowBe4 security experts share their experiences of helping change people's behaviors
#HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks
Recent attacks on the public sector show these organizations need to be hyper-focused on protecting themselves