Infosecurity Opinions
What Makes the FIFA World Cup a Prime Target for Cyber-Criminals?
Sporting events like the FIFA world cups are a tempting target for DDoS attackers
Tackling the Scourge of Advertising Fraud
Cybersecurity teams need to work in parallel with marketers to lessen the impact made by ad fraud
#HowTo: Strengthen Supply Chain Security
Eilon Elhadad identifies three key areas we should focus on to strengthen supply chain security
How to Mitigate the Cyber Risks of Energy Blackouts
Potential energy blackouts this winter could cause cyber risks for organizations if they aren't prepared
Beyond Google: The Real Problem with Data Privacy
We need to accelerate the adoption of new technologies, protocols and standards that prioritize the control of data by eliminating silos and copies
#HowTo: Make Security a Board Level Discussion
Creating a collective approach to cybersecurity starts from the top down, says Microsoft's Sarah Armstrong-Smith
Turning Data into Evidence to Accelerate SecOps Success
Contextual understanding of data is crucial to enhance network defenders' detection and response capabilities
Moving Away From a ‘Checklist’ Approach to Federal Compliance in Cloud Security
The way organizations implement federal cloud security frameworks determines the risk and therefore effectiveness of the controls
#HowTo: Secure On-Chain Data
Despite advancements in blockchain security, we currently live in an awkward time with a high experimentation factor and few security options
Cyber-Attacks on UK Councils – Why They Happen and What We Can Do About it
UK Councils have become a major target for cyber-criminals, and action must be taken to protect these bodies
‘Last Call’ to Prepare for Two US Privacy Laws
With only weeks remaining, organizations must ensure they are ready to comply with two US privacy laws going into effect on January 1, 2023
HowTo: Fight Cyber-Threats in the Metaverse
Now is the time to invest in training the architects of the Metaverse to navigate its security threats
Tech Addiction and Work Burnout Make us Prone to Phishing Attacks
Confronting the issues related to tech addiction will help your organization combat the potential of cyber-attacks
#HowTo: Build Trust in Your Software Through Insights
Organizations can benefit from learning from the experiences of peers to improve their software security
Cybersecurity Awareness: An Open Letter to CISOs
Now is the time to focus on long-term behavioral change rather than cybersecurity awareness, says Oz Alashe
How DDoS Disrupts Live Events
DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event
#HowTo: Secure Your Cloud Migration
Organizations must take action to strengthen its security posture amid cloud migration
What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem
Researchers have observed 10,666 ransomware variations in the past six months
Cyberwar is Changing – is Your Organization Ready?
Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare
#HowTo: Build Trust Between Developers and Security Teams
To make software more secure, we must overcome cultural differences between developers and security teams