Infosecurity Opinions
GSaaS: The Changing Dynamics of Cybersecurity
GSaaS will shape the future of organizations' data security
Why AI and Automation Provide Superhuman Security
While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race
Cloud Misconfigurations: The Hidden but Preventable Threat to Cloud Data
Misconfigured cloud environments is an increasing security issue for businesses
Securing a Hybrid Work Environment: The Worst of Both Worlds
The new threat landscape and how organizations can prepare and protect themselves
The Three Pillars of Unified Risk Management for Product Security
In today's threat landscape, security requires a holistic approach involving both software and hardware aspects
#HowTo: Defend Against Increasingly Convincing Phishing Attacks
Cyber-criminals have refined their phishing techniques during the pandemic, and organizations must improve their defenses
Prioritize the Fraud Epidemic Arising from the Pandemic
Finding the root cause of fraud involves undertaking offensive counter-fraud
Combating Cyber-Threats in the Age of Big Tech
Why big tech must work hard at IT security, using their own in-house expertise and benefiting from third-party security experts
Why the Pegasus Mobile Spyware Incident is a Wake-Up Call
The Pegasus spyware incident shows it's vital to collaborate in the technology sector to enhance security and privacy
Why Apple's iCloud+ Provides a Future Unlocking for Authoritarian Government Data Surveillance
Why the future belongs to organizations that don’t see a dichotomy between regulation and advancement
Embedded Fraud Analytics for DeFi Protocols
Fraud analytics systems are needed to help build secure DeFi ecosystems
Security Best Practices for Hybrid Work Environments
With hybrid working becoming the norm in many organizations, IT teams must get ahead to optimize security
Challenges and Future Trends in Cryptography
What cryptography innovations to better secure data and improve infrastructures can we look forward to?
#HowTo: Stay Secure When Deploying Robotic Process Automation
With robotic process automation becoming increasingly popular, what security measures are required?
When Cyber-Attacks Lead to Disasters, Does the Stafford Act Apply?
As critical infrastructure becomes more vulnerable to disastrous cyber-attacks, the US must seek novel solutions to keep its citizens safe
Business Leaders Need to Quantify Their Cyber Risk
Consistent CRQ practice is key to quantifying cyber risk, enabling better business decisions to be made
Identity Security Can Reshape Enterprise IT Post-Pandemic
Are identity-focused security measures necessary to support new ways of working?
Why EU Data Laws Remain Important to UK Businesses Post-Brexit
It is critical UK businesses stay up to date with changes to EU and UK data regulations
An Evolving Cyber Threat: Ransomware-as-a-Service
RaaS has lowered the barrier to entry to launch ransomware attacks, making this vector a much greater threat to organizations
#HowTo: Accelerate the Enterprise Journey to Passwordless
How can organizations design a phased strategy to passwordless authentication?