Infosecurity Opinions
How to Build an Autonomic Security Operations Center (SOC)
A guide to transforming a SOC’s scale, visibility and automation
#HowTo: Introduce Advanced Technologies into Your Security Strategy
Advanced technologies are crucial to combatting modern cyber-threats, but how can they be integrated into your organization?
Criminal Cryptocurrency Transactions Will Drop by 30% by 2024 - Here's Why
Avivah Litan, VP research analyst at Gartner, outlines the four key developments why this drop will happen
Why Diversity Is Crucial to Bringing Cybersecurity Recruitment Into the 21st Century
How businesses should re-evaluate their hiring criteria, and how the current industry talent gaps can be navigated
Cyber-War Exclusion Clauses in Cyber Insurance
Why business leaders can no longer rely on insurers to bail them out when hit by ransomware
Why A Fundamental Change in Cybersecurity Is Required
As people’s lives become more linked to the digital realm, now is the time to move forward with digital safety
Quantum Encryption: The Basics
We’re on the verge of a state of 'quantum security' for everyone
#HowTo: Meet the Cyber Jobs Challenge
Technology solutions that leverage automation, context and the skills your team are key to addressing the cyber skills gap
Can High-Security Workers Keep Their Mobile Devices (and Themselves) Safe?
How high-security organizations can be in a stronger position to monitor and control all employee devices
The Cyber-Threat in 2022: Where You Keep Your Data Will Make or Break the Success of an Attack
Why recent work environment transitions increase the opportunities for cyber-criminals to infiltrate businesses
Knowing What's Best: Breach Prevention or Breach Mitigation?
Data breaches are accelerating in 2022, and your business could be next
Log4j Showed Us That Public Disclosure Still Helps Attackers
Why we must ensure we put more robust disclosure processes in place
#HowTo: Stay on Top of Cyber-Hygiene
Cyber-hygiene might not be the most exciting security topic, but it’s the most important
The Cybersecurity Issues We Can't Ignore in 2022
Why the metaverse will create new cybersecurity vulnerabilities
#HowTo: Implement Continuous Compliance for Kubernetes
What do organizations have to do to maintain compliance with Kubernetes?
A Look Back at an Unprecedented Year in Ransomware
A look back at ransomware through 2021 and how communications tactics have evolved
#DataPrivacyWeek: The Rise of Ransomware and the Evolving Threat Landscape
The most effective way to establish a line of defense against ransomware
Team Talk - Making Sense of Simulated Attack Exercises
Whatever we choose to call it, the need for adversary-simulated attacks is only going to increase
#DataPrivacyDay: Key GDPR Compliance Issues to Watch in the Artificial Intelligence Space
Growing use of AI in business operations triggers privacy and security challenges requiring thoughtful consideration