Infosecurity Opinions
Why the Assure Scheme Is Still Getting off the Ground in the Aviation Sector
Why the new ASSURE cybersecurity scheme is experiencing teething problems
#DataPrivacyWeek: Data Privacy vs. Visibility: The Security Consideration
How organizations can ensure the security of their IoT and cloud environments with deep data observability
Identity Theft Will Get Worse
Why organizations need to enhance their approach to identity verification
#DataPrivacyWeek: The Best Kept Secrets About Data Privacy
Why innovation in data privacy can improve value for businesses and consumers alike
#HowTo: Evaluate Your Cyber Insurance
Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention
The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices
This new democratization of hacking tools means that no business is safe
Tackling Misconceptions of Mobile-Based Authentication
The importance of the security and ease-of-use credentials of mobile-based one-time passcodes
Why Zero Trust is the Best Defence for our Digital Food Supply Chain
A zero trust, best-practice approach is key to protecting critical food supply infrastructure
The Future of Cloud-Native in a Brave New World
How IT teams can utilize the full benefits of cloud-native while significantly lowering the risk
Smart City Development Is Pushing Video Surveillance to the Cloud
Shifting surveillance to the cloud requires increased access to crucial real-time data
#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security
It usually takes less than 10 minutes to score a company’s security based on their public information
GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors
Several tips for SaaS companies to navigate the updated regulations
Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind
Three identity security practices that are fundamental to the success of a zero trust strategy
Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected
Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection
Stop Purchasing, Start Developing: Why Hiring for Tech in 2022 Will Look Very Different
Why cyber reskilling and upskilling are key to keeping organizations safe
Defense Against the Dark Arts: Learnings From the Magical World to Boost Your AppSec
How businesses can guard against the threat actors who are cursing, jinxing and charming their way past security defenses
Why Politically Motivated Cyber-Attacks Are a Threat to Democracy
Why governments and political parties must work harder to better understand and safeguard their assets
#HowTo: Automate Your Security Processes
To make the most of automation, it’s important to adopt a holistic approach to your processes and people
Protecting Supply Chains from Highly Contagious Attacks
Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction