Infosecurity Opinions
The Power of Anonymity in Supply Chain Security
The rise in supply chain attacks should serve as a warning to organizations to update their email security
Going Passwordless: What Are the Benefits For Your Business?
Given the number of breaches associated with stolen credentials, should orgs go passwordless?
How DNS Security Can Help Combat the IoT Challenge
Domain name system (DNS) can help IT teams protect their network against shadow IT threats
Three Key Elements of a Defense-in-Depth Approach to Phishing
What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?
#HowTo: Protect Medical Institutions from Cyber-Attacks
Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems
How Ransomware is Teaming Up with DDoS
Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect
Data Sovereignty and Privacy Compliance Post Schrems II
How can organizations remain compliant following the Schrems II decision last year?
Why Enterprise Users Can't Wait for Patch Updates
Are software patches often little more than a glorified form of Whack-A-Mole?
How Has the Education Sector Adapted to Life in the Cloud?
Education institutions have faced particular challenges with cloud adoption during COVID-19
Signs, Causes and Solutions for Network Data Breaches
What are the common signs and solutions for dealing with network breaches?
#HowTo: Ensure Third Parties Don't Compromise Your Supply Chain
More disciplined attention is required to make sure third party vendors don't compromise your supply chain
Protecting CNI: It’s About the Collective
Nominet argues that protecting CNI requires a collaborative approach
Disengaged Employees Could Become Your Organization's Greatest Security Threat
Organizations must establish accountability for security to avoid the danger posed by disengaged employees
What Are GDPR's Hidden Benefits Three Years On?
What should organizations do to ensure they meet GDPR standards on data security and privacy?
What's New in the EU's Updated Standard Contractual Clauses?
Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses
Is the "Cyber Skills Shortage" a Misnomer?
If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage
#HowTo: Approach Identity Management
To support identity effectively, we have to implement processes that use standards and embrace technologies
Fileless Attacks: Addressing Evolving Malware Threats
Organizations must consider fileless malware threats as well as traditional approaches
What We Can Learn from Recent High Profile Cyber Attacks?
What actions should organisations take to improve their security amid rising and more sophisticated threats?
Proactive Security Key to Combatting Supply Chain Attacks
What lessons can be learned from the recent Air India data breach?