Infosecurity Opinions
Why SIEM is Not a Silver Bullet for Threat Detection and Response
Is SIEM really essential for threat detection and response?
Navigating the New Security Threats to Business Travel after COVID-19
Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them
#HowTo: Strengthen Supply Chain Security
Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations
Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question
Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum
Can You Identify and Defend Your Organization's Crown Jewels?
You cannot protect your assets effectively if you do not have insight into which assets are most valuable.
Slow and Steady Wins the Race to the Cloud
Rushing through cloud migration will leave organizations more vulnerable to security breaches
Charting a Path Out of an Epidemic of Hidden Breaches
The cyber industry needs to get better at detecting and preventing hidden breaches
Considerations When Sharing Information with an AG's Office
What are the risks associated with producing info to a state AG?
Why Businesses Must Diversify Their Tech
In light of the widespread website outage last months, should organizations look to diversify their tech providers?
#HowTo: Approach Budgeting as a CISO
CISOs need to assess how security can contribute to business objectives to manage their budgets
The Countdown Towards Zero Trust and MFA
What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?
The Evolution of Ransomware and How to Move Forward
Ransomware has evolved significantly over recent years, and governments and businesses need to adapt
Staying On Guard Against Cyber-Attacks
Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?
Understanding and Mitigating Cyber Risk in the Healthcare System
Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses
#HowTo: Be More Resilient Against Ransomware
Organizations need to start designing their disaster recovery plans with ransomware in mind
Malware-as-a-Service is a Booming Business
Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?
The Power of Anonymity in Supply Chain Security
The rise in supply chain attacks should serve as a warning to organizations to update their email security
Going Passwordless: What Are the Benefits For Your Business?
Given the number of breaches associated with stolen credentials, should orgs go passwordless?
How DNS Security Can Help Combat the IoT Challenge
Domain name system (DNS) can help IT teams protect their network against shadow IT threats
Three Key Elements of a Defense-in-Depth Approach to Phishing
What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?