Infosecurity Opinions

4 Reasons Why Christmas Is Peak Season for Cyber-Attacks
Four reasons why and what you can do to protect yourself

AI-Powered Malware Doesn't Actually Exist
Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

Cyber Resiliency: Safeguarding Data for Business Continuity
The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing
While innovations are intended for good, hackers lie in wait to capitalize on them

CBD: Stress Reliever to Stress-Inducing Phishing Scam
It only takes one careless click for hackers to gain access to a network

Insider Threats: Protecting from Within
Why access, data and awareness are key to minimizing malicious insider threat risk

#HowTo: Improve Security Awareness Training
Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

Cybersecurity Risks Around Smart City Development
Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

Will Single Sign-on Ever Become Mainstream?
For SSO to be mainstream, it's vital to maintain control of identities and user access levels

The Long and Short Roads to Security Maturity
Why less mature organizations have a long and hazardous road to travel

#HowTo: Prevent Insider Threats in Your Organization
What are the different types of insider threats, and how can they be prevented?

Crime-As-A-Service Is Leveling Up - And Businesses Aren't Prepared
Crime-as-a-Service is helping cyber-criminals level up their attacks and target organizations with sophisticated tactics

Mind the Gap: Moving from Missing Encryption to Ubiquitous Data Security
How new software addresses the challenge of closing gaps and consolidating complexity into a single, invisible data platform

Top 3 Mistakes Companies Make With Security and Compliance
Avoid costly mistakes by establishing suitable systems and protocols to keep your compliance up to date

Defending DNS Against DDoS Attacks to Protect Reputation, Revenue and Customers
Why DNS is vulnerable and what companies can do to shore up defenses

#HowTo: Mitigate Cyber-Risks During Financial Milestones
Cybersecurity needs to be fully integrated into a company's valuation ahead of IPOs, M&As, investments and other financial milestones

Cyber Vulnerabilities and Safety Risks Across the UK's Digital Railway
How the rail industry can balance physical security and digital safety to keep the UK rail network secure

Cybersecurity Pros Need a Seat at the Table
It’s time to move from a business continuity mindset to a business agility mindset

The SEC Means Business: Clamping Down on Financial Institution Complacency with Security Practices
Companies lacking effective policies or failing to follow through on them will see harsh enforcement actions

Why a Risk Reset Is Needed for a More Secure, Automated Cyber Future
Why a risk reset is vital and why there's no better time than now to implement change























