Infosecurity Opinions
#HowTo: Protect Your Organization's Root Accounts
As attacks on root account credentials continue to rise, organizations should take an active role in securing these credentials as much as possible
Ensuring Visibility and Data Access Control Across Clouds
Why businesses must adopt a delegated governance approach
Digitalization is Everywhere, So Why isn't Healthcare Keeping Up?
If the healthcare industry is to continue its rapid digitalization, it must use a fit-for-purpose solution
Team Sports in Cybersecurity: Collaboration Wins Gold
Helping organizations combat ransomware threats will give them the confidence to achieve gold-medal-worthy security
Thwarting Insider Threats, Ransomware and Protecting Water and Wastewater Facilities
WWS facilities deserve the most sophisticated defense the market offers
What is Identity and Access Management, and Why is it so important?
With IAM measures, organizations can prevent unauthorized access from online hackers and protect sensitive data
Simplifying Multicloud Security in a Cloud-Native World
Five steps organizations can take to simplify multi-cloud security
Building Privacy Into AI: Is the Future Federated?
Machine learning requires data to be stored on a centralized server, resulting in a plethora of privacy implications
Phishing Reports Show You There's a Problem, but What's Next?
Why investing in fun and engaging training for your team will pay dividends
Three Critical Cybersecurity Metrics to Fight Back
How CISOs can fix security weaknesses to stop and mitigate attacks effectively
#HowTo: Counter Common E-commerce Threats
As e-commerce continues to grow, online retailers are more susceptible to outside threats
The True Cost of DDoS Attacks
The cost of DDoS attacks is on the rise, and only an active defense will counter their potentially crippling impact
What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?
The practical uses of AI to address the skills shortage in cybersecurity
Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks
Training improves the cyber resilience of employees and reduces the likelihood of an organization suffering a breach
Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce
Follow these zero trust best practices to secure data and assets
Analyzing the Twitch Hack and a Potential Security Hole Around IRC
The attack seems to be the work of an individual attacker intent on disrupting the company
Schools Prove Easy Targets For Hackers
Schools have significant revenues, a general lack of cyber security and a low perception of information security
Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection
With threat actors circling, there’s an urgent need to start these efforts now
#HowTo: Avoid Credential Abuse
Cloud-based MFA can enhance organizations' security
Developers and Security - Using Data to Consolidate and Collaborate
Looking at data in context can help teams improve their results, consolidate their tooling and collaborate more effectively