Infosecurity Opinions
#HowTo: Stay Cyber-Secure This Summer
Chris Harris offers safe practices holiday-goers should follow this summer
#HowTo: Overcome Burnout in Cybersecurity Teams
Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk
The Needle is Shifting on Post-Quantum Security – Here’s What You Need to Know
Businesses now have the tools they need to begin thinking about migrating to new post-quantum standards
HowTo: Level Up MSPs’ Cybersecurity
MSPs that monitor, deploy and respond will be a step ahead of their competitors
Is There a Weak Link in Your Supply Chain?
The supply chain is only secure when all entities carry out effective, coordinated security measures
#HowTo: Plug Data Leaks
While companies are faced with more risks, taking a proactive approach is key to stopping a data leak from causing a major incident
Applying Infosecurity Principles and Practices to Cognitive Security
How many of the concepts and TTPs developed in cybersecurity can be applied to CogSec
Is Open Source the Greatest Path to Security?
Open source offers real security benefits to organizations, but also carries significant risks
How Humans Can Positively Interact with Technology
Technology has been developing rapidly but society has struggled to keep up. People now find themselves exploited
#HowTo: Demystify the NIST Cybersecurity Framework
The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines
How to Keep Your CMS Safe and Secure
Unless properly secured, a CMS can open the door to bad operators
Only More Secure Coding Can Protect the Software Supply Chain
How developers can build more secure coding and increase industry awareness of the issue
California's Child Privacy Protections Could Be Thorn in Stalkerware's Side
California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat
Why the Password Is Not Dead
Why passwords are here to stay as the core of personal digital security
European Commission Acknowledges the Evolving Threat Landscape
Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more
#HowTo: Build Awareness and Best Practices into Your Company and Development Culture
How can organizations change security from a defensive tax model to an offensive mode?
Protecting the Three Dimensions of the Data Lifecycle
To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle
Solving the Gen-N Security Dilemma
The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks
#HowTo: Eradicate Plaintext Data Breaches
Organizations that encrypt everything can protect sensitive information even in the event of a data leak
#HowTo: Protect Your Organization From the Increasing Threat of Ransomware
Organizations need to implement stronger cyber-defenses to tackle threat of ransomware