Infosecurity Opinions
Why EU Data Laws Remain Important to UK Businesses Post-Brexit
It is critical UK businesses stay up to date with changes to EU and UK data regulations
An Evolving Cyber Threat: Ransomware-as-a-Service
RaaS has lowered the barrier to entry to launch ransomware attacks, making this vector a much greater threat to organizations
#HowTo: Accelerate the Enterprise Journey to Passwordless
How can organizations design a phased strategy to passwordless authentication?
Why It's Time for Software Development to Wake Up
There's too much at stake to allow software development security languish any longer
Empowering People to Make Meaningful Change to Security Behaviors
Rather than seeing people as the source of security problems, people need to be part of the solution
Yes...We Need More Women in Cybersecurity, But How?
Equal outcomes for women today create the possibility for equal opportunities for women tomorrow.
Cybersecurity Tips for Back to School Season 2021
How can students, parents and teachers stay safe from cyber-threats as we approach back to school season?
The Cyber War on our Critical Infrastructure and How to Win
Companies in the critical infrastructure sector must do more to protect themselves from the growing threat of cyber-attacks
The Importance of Being Cyber Resilient
True cyber resilience requires an ongoing business effort
Will AI/ML Solve the Cybersecurity Skills Gap?
Much more needs to be done to realize the full potential of AI and ML in the cybersecurity sector
#HowTo: Enhance Your Phishing Training
As phishing campaigns become more sophisticated, user awareness training must keep up
Office 365 Remains a Target for Cyber-criminals
With Office 365 an integral part of many organizations' operations, it has become a major target for cyber-criminals
How Organizations Can Fight Back Against Ransomware
How do organizations upgrade their traditional systems to combat the surge in ransomware?
Developing Gold Medal-Worthy Protection Against Video Pirates
Developing a zero trust policy is key to an effective anti-piracy strategy
Adapting Data Security for a Permanent Hybrid Working Environment
The world has permanently changed, and organizations must adapt their security policy to match
Do Open-Source Supply Chains Leave Security Gaps in Your Organization?
If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase
Why Ransomware Protection Should Start with User Awareness
Humans are normally easier to hack than networks, so this is where defensive efforts should be focused
#HowTo: Improve Ransomware Resilience Across Remote Working Environments
There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces
Data Security in the Cloud: Adapting to a New Era of Modernization
Organizations must improve their cloud data security to avoid the risk of a substantial data breach
Better Accountability and Security Needed to Improve Government Aid
Improved accountability, security and identity verification is essential to get the most out of government aid programs