Infosecurity Opinions
How Automated Offboarding Can Keep Your SaaS Stack Safe
Offboarding doesn't end when users have been disabled or removed from active directory or IAM
#HowTo: Effectively Manage and Secure APIs
API security needs to be seen as a critical dimension of a data security strategy
The Best Defense Is a Good Offense: How to Beat Ransomware
Why the conversation around ransomware needs to focus earlier on the attack chain
How to Begin Proactive Threat Hunting
The four key success factors of proactive threat hunting are VIMP – visibility, intelligence, machine learning and people
#HowTo: Get Cyber Essentials Certified
January 2022 saw significant changes to the Cyber Essentials certification, and organizations need to act to implement them
WFH - A Remote Prospect for Infosec Professionals?
Hybrid working seems set to become the norm but will security professionals be excluded given the nature of their role?
Ransomware Through the Supply Chain: Are Organizations Prepared for the New Normal?
Why it’s imperative organizations know where they fall in the supply chain to defend against attacks
Light at the End of the Ransomware Tunnel?
Insurance demands, state sanctions and reporting requirements will lead to the evolution of a new type of threat that only cyber resilience can meet.
Never-Mind the Gap: It Isn't Skills We're Short Of, It's Common Sense
To solve the cyber skills shortage, enterprises must invest in future professionals, look at existing ssets and ensure they use the right tools
Top 3 Ways Hackers Get Into Your Supplier's Network to Launch a Supply Chain Attack
From launching phishing attacks to taking advantage of negligent employees
Why the Cybersecurity Industry Needs to Change Its Siloed Perception
Why the cybersecurity industry needs to correct the evident gender disparity
#HowTo: Build The Right Skills to Become a CISO
To become a CISO, you need a wide range of skills
Investigate and Recover From Ransomware Attacks With Digital Forensics
How organizations can use digital forensics to assess damage, stop the spread and facilitate recovery
Defending Against Cyber-Threats – Think Like an Attacker
As UK businesses face increased risk of a cyber-attack, here are steps they need to take to lessen the threat
Why It's a Great Time to Be a Mobile Threat
As mobile devices become more important, hackers are seizing on a vulnerable blindspot in the enterprise attack surface
Securing Enterprise Data While Enabling Remote Working
How we can take measures to reduce our exposure to attacks and avoid being exploited
#IWD2022: Women in Cybersecurity: Why We Need to Inspire the Younger Generation
Is enough being done to close the gender gap and encourage women to join an industry?
A Critical Component of a Layered Approach to Cybersecurity: SIEMaaS
Embracing a layered approach to cybersecurity will give your organization an edge in the fight against cyber-threats
Cameras, Video Analytics and Legislation: Top Video Privacy Trends of 2022
Legislation worldwide needs to keep evolving while still allowing companies to innovate.
#HowTo: Prepare for the Future of Electronic Identities
Not everyone is prepared to take the leap and there is still some hesitancy around eID