Infosecurity Opinions
Why Politically Motivated Cyber-Attacks Are a Threat to Democracy
Why governments and political parties must work harder to better understand and safeguard their assets
#HowTo: Automate Your Security Processes
To make the most of automation, it’s important to adopt a holistic approach to your processes and people
Protecting Supply Chains from Highly Contagious Attacks
Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction
Why Holistic Ecosystems Will Be Central to Future Cybersecurity
Businesses require an approach comprising both technological and human components
The Colonial Pipeline Attack Eight Months On
Why asset operators need to begin shaping their security programs to protect their most critical assets
Cybersecurity Trends for 2022
Cybersecurity needs to remain at the front of mind in 2022 as companies look to build on the measures they put in place in 2021
Protecting the Most Crucial Software Supply Chain Targets
How today’s attackers take advantage of software supply chain weaknesses
#HowTo: Solve Your Organization’s Password Woes
CISOs must perform a careful balancing act – protecting their organization’s systems while not overly inconveniencing or disrupting employees
How Long Before VPNs Are Mothballed?
Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core
The Top 5 Cybersecurity Tools Companies Need to Implement Right Now
The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked
DDoS Attacks Against Online Gamers and the Damaging Ripple Effect
Why vulnerable and critical industries must further invest in cybersecurity
QR Security - Are You Ready?
What are the security concerns surrounding QR codes, and how can these be mitigated?
Cybersecurity for the Post-COVID Era
IT teams need to rethink their cybersecurity strategies for the better
#HowTo: Measure the Performance of Your Cyber Team
Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent
How to Build and Retain Your Cybersecurity A-Team
With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever
Cyber-Attacks: Risk Transference as Crucial as Risk Prevention
How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks
How Businesses Can Stay Ahead of the Christmas Rush
How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers
How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI
We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern
4 Reasons Why Christmas Is Peak Season for Cyber-Attacks
Four reasons why and what you can do to protect yourself
AI-Powered Malware Doesn't Actually Exist
Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings