Infosecurity Opinions
Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools
Organizations need to find a way to capture the real value of their tools and metrics
Compete to Communicate on Cybersecurity
As tech firms compete to offer software at lowest prices, communications around cybersecurity should be an imperative
The New Era of Cyber-Attacks - Who is Most at Risk This Year?
Cyber-attacks are constantly evolving, and so are the actual targets of these attacks
#HowTo: Launch a Remote Incident Response
Remote working has changed how incident response teams are able to respond to security incidents
What the War in Ukraine Means
The war in Ukraine has ramifications, including widespread use of crypto and Russia gaining unfettered access to source code
Preparation Includes Understanding Your Battlefield
Nations should review their cybersecurity strategies now so their actions aren’t merely reactionary
Why Relying on AI for Automated Detection and Response is Dangerous
Only a human and machine collaboration enables companies to conduct simpler, faster and more accurate security investigations
The Rising Threat of Apps in the World of SaaS Platforms
While marketplaces for third-party apps on platforms like Zoom and Slack expand, security solutions aren't keeping up
#HowTo: Keep the Benefits of Zero Trust
A flexible zero trust-based approach is crucial as cyber-attacks rise
Will FIDO Replace OTP Multi-Factor Authentication?
Organizations should implement authentication schemes that offer better security and login experience
#WorldPasswordDay: 9 Reasons to Adopt a Corporate Password Manager
How password managers help you better control your credentials and mitigate risks
Why Is the UN Collecting the Biometric Data of Ukrainian Refugees?
The knee-jerk reaction to using biometrics in a country where it is gratuitous is concerning
#HowTo: Solve the Machine Identity Crisis
With damaging breaches becoming common from increased machine identity environment complexity, companies must act now
Cloud Migration is in Full Swing: How to Achieve Security at Every Stage of Adoption
A cloudy future looms: CISOs must act now
Security for 5G and the Intelligent Edge
A lone employee can’t watch for all potential attacks, so automated software is needed
Why No-Code Automation is the Future of SecOps
How your team can maximize its benefits
Why It's Time to Stop Putting off Zero Trust
As organizations bolster business resilience and enhance cyber maturity, here’s what they need to know
What Does a 5G Cyber-Attack Look Like?
5G signals a huge change in the way we manage connected infrastructure
Knowledge Sharing: Breaking Down Real-World Attacks to Learn for the Future
When we balance the knowns and unknowns, we stand the best chance of winning not just the battle but the war
Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tighten
As quantum computing becomes commercially available, the cybersecurity workforce must increase to meet demand